0000100)={0xffffffffffffffff}) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) r1 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x100000000, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000040)={0x7, 0x0, 0x10000, 0x3}) ioctl$DRM_IOCTL_AGP_FREE(r1, 0x40206435, &(0x7f0000000080)={0x4, r2, 0x10001, 0x7fffffff}) set_tid_address(&(0x7f0000000000)) r3 = dup(r1) ioctl$KVM_GET_ONE_REG(r3, 0x4010aeab, &(0x7f0000000280)={0xfffffffffffffffe, 0x2000000013}) 03:52:10 executing program 4 (fault-call:1 fault-nth:27): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x100, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x20) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000180)={@mcast2, r3}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:10 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x8000a0) [ 1747.196819][T10198] FAULT_INJECTION: forcing a failure. [ 1747.196819][T10198] name failslab, interval 1, probability 0, space 0, times 0 [ 1747.245009][T10198] CPU: 1 PID: 10198 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1747.254178][T10198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1747.254186][T10198] Call Trace: [ 1747.254222][T10198] dump_stack+0x172/0x1f0 [ 1747.254248][T10198] should_fail.cold+0xa/0x15 [ 1747.277140][T10198] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1747.277162][T10198] ? ___might_sleep+0x163/0x280 [ 1747.277183][T10198] __should_failslab+0x121/0x190 [ 1747.287842][T10198] should_failslab+0x9/0x14 [ 1747.287861][T10198] kmem_cache_alloc_trace+0x2d1/0x760 [ 1747.287879][T10198] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1747.287903][T10198] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1747.287926][T10198] __list_lru_init+0x3cf/0x6e0 [ 1747.303534][T10198] alloc_super+0x762/0x890 [ 1747.303556][T10198] ? test_single_super+0x10/0x10 [ 1747.314995][T10198] sget_userns+0xf1/0x560 [ 1747.315010][T10198] ? kill_litter_super+0x60/0x60 [ 1747.315030][T10198] ? test_single_super+0x10/0x10 03:52:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x31, 0xa000) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r2, 0x114, 0xa, &(0x7f0000000140)=ANY=[@ANYBLOB="0080841d373c81e081a414f85a937582d0989669ec7826cae128fce6e946011fc29494da2fa9287676bb9bd6ca08c66bfbcc6bd6c7"], 0x1) 03:52:11 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000002c0)=0x80) recvmmsg(0xffffffffffffffff, &(0x7f0000005680)=[{{&(0x7f0000000300)=@xdp, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000380)=""/55, 0x37}, {&(0x7f00000003c0)=""/197, 0xc5}], 0x2, &(0x7f0000000500)=""/84, 0x54}}, {{&(0x7f0000000580)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000600)=""/204, 0xcc}, {&(0x7f0000000700)=""/4, 0x4}, {&(0x7f0000000740)=""/109, 0x6d}], 0x3, &(0x7f0000000800)=""/7, 0x7}, 0x226ab8db}, {{&(0x7f0000000840)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000f80)=[{&(0x7f00000008c0)=""/228, 0xe4}, {&(0x7f00000009c0)=""/15, 0xf}, {&(0x7f0000000a00)=""/249, 0xf9}, {&(0x7f0000000b00)=""/175, 0xaf}, {&(0x7f0000000bc0)=""/92, 0x5c}, {&(0x7f0000000c40)=""/14, 0xe}, {&(0x7f0000000c80)=""/47, 0x2f}, {&(0x7f0000000cc0)=""/248, 0xf8}, {&(0x7f0000000dc0)=""/252, 0xfc}, {&(0x7f0000000ec0)=""/157, 0x9d}], 0xa}, 0x3}, {{&(0x7f0000001040)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x80, &(0x7f00000021c0)=[{&(0x7f00000010c0)=""/48, 0x30}, {&(0x7f0000001100)=""/14, 0xe}, {&(0x7f0000001140)=""/72, 0x48}, {&(0x7f00000011c0)=""/4096, 0x1000}], 0x4, &(0x7f0000002200)=""/119, 0x77}, 0x7fff}, {{&(0x7f0000002280)=@can, 0x80, &(0x7f0000003440)=[{&(0x7f0000002300)=""/141, 0x8d}, {&(0x7f00000023c0)=""/4096, 0x1000}, {&(0x7f00000033c0)=""/69, 0x45}], 0x3, &(0x7f0000003480)=""/4096, 0x1000}, 0x6}, {{&(0x7f0000004480)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000004640)=[{&(0x7f0000004500)=""/243, 0xf3}, {&(0x7f0000004600)=""/47, 0x2f}], 0x2, &(0x7f0000004680)=""/4096, 0x1000}, 0x1}], 0x6, 0x2, &(0x7f0000005800)={0x77359400}) r3 = getuid() setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000005840)={{{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x4e24, 0x5, 0x4e24, 0x101, 0xa, 0x0, 0x20, 0x2c, r2, r3}, {0x3, 0x2, 0x8, 0x3, 0x2, 0x10001, 0x7, 0x100020000}, {0x5, 0x6, 0x7ff, 0x9}, 0x400, 0x6e6bbb, 0x2, 0x1, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d2, 0xff}, 0xa, @in6=@mcast2, 0x3504, 0x6, 0x2, 0x6634, 0x80000001, 0x7ff, 0xff}}, 0xe8) r4 = dup(r0) ioctl$KVM_GET_ONE_REG(r4, 0x4010aeab, &(0x7f0000000280)={0xfffffffffffffffe, 0x2000000013}) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r4, 0x80045530, &(0x7f0000000000)=""/79) r5 = getpgid(0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000140)={0x7, 0x0, 0x10001, 0x100000000}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000180)={0x400, r6, 0x10001, 0x1000}) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f00000001c0)={0x6aa, 0x2, 0x87}) sched_setparam(r5, &(0x7f0000000080)=0x8) ioctl$EVIOCSREP(r4, 0x40084503, &(0x7f0000000100)=[0x8, 0x100000000]) [ 1747.324232][T10198] ? kill_litter_super+0x60/0x60 [ 1747.324247][T10198] sget+0x10c/0x150 [ 1747.324266][T10198] mount_bdev+0xff/0x3c0 [ 1747.356448][T10198] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1747.361555][T10198] jfs_do_mount+0x35/0x40 [ 1747.365975][T10198] ? jfs_get_dquots+0x20/0x20 [ 1747.370665][T10198] legacy_get_tree+0xf2/0x200 [ 1747.375344][T10198] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1747.381808][T10198] vfs_get_tree+0x123/0x450 [ 1747.386312][T10198] do_mount+0x1436/0x2c40 [ 1747.390638][T10198] ? copy_mount_string+0x40/0x40 [ 1747.395587][T10198] ? _copy_from_user+0xdd/0x150 [ 1747.400432][T10198] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1747.406676][T10198] ? copy_mount_options+0x280/0x3a0 [ 1747.411866][T10198] ksys_mount+0xdb/0x150 [ 1747.416100][T10198] __x64_sys_mount+0xbe/0x150 [ 1747.420773][T10198] do_syscall_64+0x103/0x610 [ 1747.425359][T10198] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1747.431243][T10198] RIP: 0033:0x458209 [ 1747.435121][T10198] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1747.454850][T10198] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1747.463268][T10198] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 [ 1747.471239][T10198] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1747.479205][T10198] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1747.487301][T10198] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 03:52:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="2900000004000000000000fb80000000016d568f46895f0608000000000000d3c748550d8ed385c7e7f065dd901f47e2eec7289426ce62347e554b13320b2c8337752587f7cf389dbd2bf6d1fc17a83c2e0c5bc1cb65092376d8"], 0x29) [ 1747.495457][T10198] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 03:52:11 executing program 4 (fault-call:1 fault-nth:28): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:11 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x1000000) [ 1747.733108][T10229] FAULT_INJECTION: forcing a failure. [ 1747.733108][T10229] name failslab, interval 1, probability 0, space 0, times 0 [ 1747.755238][T10229] CPU: 0 PID: 10229 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1747.764394][T10229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1747.774461][T10229] Call Trace: [ 1747.777788][T10229] dump_stack+0x172/0x1f0 [ 1747.782143][T10229] should_fail.cold+0xa/0x15 [ 1747.782168][T10229] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1747.782193][T10229] ? ___might_sleep+0x163/0x280 [ 1747.792707][T10229] __should_failslab+0x121/0x190 [ 1747.792727][T10229] should_failslab+0x9/0x14 [ 1747.792744][T10229] kmem_cache_alloc_trace+0x2d1/0x760 [ 1747.792767][T10229] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1747.818227][T10229] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1747.823890][T10229] __list_lru_init+0x3cf/0x6e0 [ 1747.828679][T10229] alloc_super+0x762/0x890 [ 1747.833201][T10229] ? test_single_super+0x10/0x10 [ 1747.838152][T10229] sget_userns+0xf1/0x560 [ 1747.842489][T10229] ? kill_litter_super+0x60/0x60 [ 1747.847444][T10229] ? test_single_super+0x10/0x10 [ 1747.852450][T10229] ? kill_litter_super+0x60/0x60 [ 1747.857401][T10229] sget+0x10c/0x150 [ 1747.861435][T10229] mount_bdev+0xff/0x3c0 [ 1747.865693][T10229] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1747.870811][T10229] jfs_do_mount+0x35/0x40 [ 1747.875233][T10229] ? jfs_get_dquots+0x20/0x20 [ 1747.879912][T10229] legacy_get_tree+0xf2/0x200 [ 1747.884779][T10229] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1747.891030][T10229] vfs_get_tree+0x123/0x450 [ 1747.895525][T10229] do_mount+0x1436/0x2c40 [ 1747.899849][T10229] ? copy_mount_string+0x40/0x40 [ 1747.904797][T10229] ? _copy_from_user+0xdd/0x150 [ 1747.909650][T10229] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1747.915984][T10229] ? copy_mount_options+0x280/0x3a0 [ 1747.921198][T10229] ksys_mount+0xdb/0x150 [ 1747.925443][T10229] __x64_sys_mount+0xbe/0x150 [ 1747.930213][T10229] do_syscall_64+0x103/0x610 [ 1747.934791][T10229] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1747.940663][T10229] RIP: 0033:0x458209 [ 1747.944552][T10229] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1747.964248][T10229] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1747.972744][T10229] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 [ 1747.981244][T10229] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1747.989303][T10229] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1747.997349][T10229] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1748.005339][T10229] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 03:52:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x0, 0x200000) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffa000/0x3000)=nil, 0x3000}, 0x3}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000340)={0x0, 0x8000, 0x8000}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000480)={r2, 0xea, "3dbac76986cebaa1b2d176887e60e7f0a3b80b65998957ba5d836c34b7d2415e947cec6bd1feb7f0abfce48790607f04241271ed2821a6dd6be2a8993228f7d6d3279330bbec6cba2020c5db40a0f724ae28fe6e463cb48467c2f58d804892e76c0774795cdf758562c93156300266b626e141930d213463fb43d0b6cb8b597d13fc1a85c010fbf6b7dd3ab566a5d5f24559966f695a8e2dfe47b45237a62a88bf34c01fcabca2335cd29336f098e6c189f79d6f35464e95f8419f744e4bcc0f62d04e5103f029436952ead7b65ebba44800efe841346f89392b6b3df102a4c907f53091f8fdf7d63419"}, &(0x7f00000003c0)=0xf2) setsockopt$inet6_int(r1, 0x29, 0x46, &(0x7f0000000200)=0x86, 0x4) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="f3f103", @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726fe45f69643d", @ANYRESDEC=0x0, @ANYBLOB=', ']) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200180, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x105000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000000c0)={0xfffffffffffff801, 0x0, 0x2, 0x6}) ioctl$DRM_IOCTL_SG_ALLOC(r4, 0xc0106438, &(0x7f0000000140)={0xa9a3, r5}) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000580)=ANY=[@ANYBLOB="290000000400000000020001000000000004eb00000000000000008d80e694e47c9851988435d1051bfef75f939f5e57f09146031f4102f6f24d8ec0609fac3ff7863921e50d2aa19eee00f38bb104d061ab88eb046c8695ad118f32b229014f7e412723981101294bdb5b01fce68a52c1942a4cf95b35f9aaca0edd47f2a9a3fd7f7e58bd403f926cf1df585c47bbc2440c1c08bb73f116d54aed543b1c5761708ecd554d75981f730960927259cda7be018cf0ea07fe09ee9f39c2fb372a83c69203ac1b845ad9e26d85293cd68a3ec23706ad"], 0x29) openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x101000, 0x0) 03:52:12 executing program 2: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:52:12 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000280)={0xfffffffffffffffe, 0x2000000013}) ioctl$KVM_NMI(r1, 0xae9a) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000000)) 03:52:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r2, 0xd29dba3f7c40a327, 0x70bd25, 0x25dfdbfe, {}, [@SEG6_ATTR_DST={0x14, 0x1, @local}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000004}, 0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:12 executing program 4 (fault-call:1 fault-nth:29): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:12 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x2000000) [ 1748.497191][T10248] FAULT_INJECTION: forcing a failure. [ 1748.497191][T10248] name failslab, interval 1, probability 0, space 0, times 0 [ 1748.557173][T10248] CPU: 0 PID: 10248 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1748.566489][T10248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1748.566505][T10248] Call Trace: [ 1748.580057][T10248] dump_stack+0x172/0x1f0 [ 1748.584925][T10248] should_fail.cold+0xa/0x15 [ 1748.590335][T10248] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1748.597478][T10248] ? ___might_sleep+0x163/0x280 [ 1748.602530][T10248] __should_failslab+0x121/0x190 03:52:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d3030303030d28e3a3a45c1430f3030303030ff0f000030301d3034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d9d9db73dbab4dc380066e5d730476f7d22ccab935abda133a073d0d268b30ac40b047cc147373c629da19978e670990c91", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x28, 0x4, 0x0, {0x1, 0xffffffffffffffff}}, 0x28) syz_init_net_socket$llc(0x1a, 0x2, 0x0) 03:52:12 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x3000000) [ 1748.607584][T10248] should_failslab+0x9/0x14 [ 1748.607611][T10248] kmem_cache_alloc_trace+0x2d1/0x760 [ 1748.617532][T10248] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1748.623533][T10248] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1748.629395][T10248] __list_lru_init+0x3cf/0x6e0 [ 1748.629418][T10248] alloc_super+0x762/0x890 [ 1748.629434][T10248] ? test_single_super+0x10/0x10 [ 1748.629449][T10248] sget_userns+0xf1/0x560 [ 1748.629462][T10248] ? kill_litter_super+0x60/0x60 03:52:12 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$TIOCEXCL(r1, 0x540c) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000280)={0xfffffffffffffffe, 0x2000000013}) 03:52:12 executing program 4 (fault-call:1 fault-nth:30): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1748.629477][T10248] ? test_single_super+0x10/0x10 [ 1748.629489][T10248] ? kill_litter_super+0x60/0x60 [ 1748.629502][T10248] sget+0x10c/0x150 [ 1748.629521][T10248] mount_bdev+0xff/0x3c0 [ 1748.629537][T10248] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1748.629557][T10248] jfs_do_mount+0x35/0x40 [ 1748.638755][T10248] ? jfs_get_dquots+0x20/0x20 [ 1748.638773][T10248] legacy_get_tree+0xf2/0x200 [ 1748.638788][T10248] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1748.638804][T10248] vfs_get_tree+0x123/0x450 [ 1748.638820][T10248] do_mount+0x1436/0x2c40 [ 1748.638839][T10248] ? copy_mount_string+0x40/0x40 [ 1748.638854][T10248] ? _copy_from_user+0xdd/0x150 [ 1748.638871][T10248] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1748.638890][T10248] ? copy_mount_options+0x280/0x3a0 [ 1748.648174][T10248] ksys_mount+0xdb/0x150 [ 1748.648194][T10248] __x64_sys_mount+0xbe/0x150 [ 1748.648213][T10248] do_syscall_64+0x103/0x610 [ 1748.648236][T10248] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1748.648247][T10248] RIP: 0033:0x458209 [ 1748.648262][T10248] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1748.648270][T10248] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1748.648297][T10248] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 [ 1748.648306][T10248] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1748.648314][T10248] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 03:52:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000080)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_SET_GSI_ROUTING(0xffffffffffffffff, 0x4008ae6a, &(0x7f00000004c0)={0x7, 0x0, [{0xe6ad, 0x3, 0x0, 0x0, @irqchip={0x9, 0x80000001}}, {0x535a24c8, 0x0, 0x0, 0x0, @msi={0xb, 0x5, 0x8}}, {0x1, 0x3, 0x0, 0x0, @adapter={0x9, 0x3, 0x2, 0x0, 0x3}}, {0x6, 0x4, 0x0, 0x0, @sint={0x6d48, 0x5317}}, {0xff, 0x2, 0x0, 0x0, @adapter={0x1, 0x400, 0x2, 0x4, 0x80}}, {0x80000001, 0x4, 0x0, 0x0, @sint={0x7, 0x5}}, {0x7, 0x4, 0x0, 0x0, @adapter={0x0, 0x5, 0x7ff, 0x3, 0x8b}}]}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="ac99767a22711bcf0a7c828a96bb5d1066643d", @ANYRESHEX=r2, @ANYBLOB=',rootmoTde=00000000000000000040000,user_id', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0000a84a58b9c08b070fdcda914da71420592c706675663e92fb527695dbc4d18fa6efe3dc416e"]) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="29000000040000000000000000000000010000000000000000cb7c958694d38a030000000000000085fa07f4e8f1eb07d49e438d160e94562a3fde2fb95ee0ac4f95f1004bc3ea8abccf2e656d2b72e5cde48659d4646b3a61475cf80b0217"], 0x29) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000002c0)={0x10000, &(0x7f00000000c0), 0x2, r1, 0xa}) [ 1748.648321][T10248] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1748.648328][T10248] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 03:52:12 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x6, 0x40200) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000280)={0xfffffffffffffffe, 0x2000000013}) [ 1748.972201][T10271] FAULT_INJECTION: forcing a failure. [ 1748.972201][T10271] name failslab, interval 1, probability 0, space 0, times 0 [ 1749.024791][T10271] CPU: 0 PID: 10271 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1749.034212][T10271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1749.044369][T10271] Call Trace: [ 1749.047701][T10271] dump_stack+0x172/0x1f0 [ 1749.052056][T10271] should_fail.cold+0xa/0x15 [ 1749.052091][T10271] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1749.062491][T10271] ? ___might_sleep+0x163/0x280 [ 1749.062510][T10271] __should_failslab+0x121/0x190 [ 1749.062526][T10271] should_failslab+0x9/0x14 [ 1749.062540][T10271] kmem_cache_alloc_trace+0x2d1/0x760 [ 1749.062557][T10271] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1749.062588][T10271] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1749.062610][T10271] __list_lru_init+0x3cf/0x6e0 [ 1749.062627][T10271] alloc_super+0x762/0x890 [ 1749.062649][T10271] ? test_single_super+0x10/0x10 [ 1749.108762][T10271] sget_userns+0xf1/0x560 [ 1749.113107][T10271] ? kill_litter_super+0x60/0x60 [ 1749.118336][T10271] ? test_single_super+0x10/0x10 [ 1749.123409][T10271] ? kill_litter_super+0x60/0x60 [ 1749.128572][T10271] sget+0x10c/0x150 [ 1749.133374][T10271] mount_bdev+0xff/0x3c0 [ 1749.137633][T10271] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1749.142951][T10271] jfs_do_mount+0x35/0x40 [ 1749.147772][T10271] ? jfs_get_dquots+0x20/0x20 [ 1749.147790][T10271] legacy_get_tree+0xf2/0x200 [ 1749.147804][T10271] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1749.147819][T10271] vfs_get_tree+0x123/0x450 [ 1749.147834][T10271] do_mount+0x1436/0x2c40 03:52:12 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x4000000) [ 1749.147853][T10271] ? copy_mount_string+0x40/0x40 [ 1749.147868][T10271] ? _copy_from_user+0xdd/0x150 [ 1749.147887][T10271] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1749.147899][T10271] ? copy_mount_options+0x280/0x3a0 [ 1749.147916][T10271] ksys_mount+0xdb/0x150 [ 1749.147939][T10271] __x64_sys_mount+0xbe/0x150 [ 1749.168529][T10271] do_syscall_64+0x103/0x610 [ 1749.168553][T10271] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1749.168574][T10271] RIP: 0033:0x458209 [ 1749.168590][T10271] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1749.168598][T10271] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1749.168612][T10271] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 [ 1749.168629][T10271] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1749.212362][T10271] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1749.212373][T10271] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1749.212381][T10271] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 03:52:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000040)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0xc) 03:52:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2784f7939bd8795327cd29d7b5cc446151e61e"]) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="290000000400000000000000210000000100000000000000000000fbffffff00010000000000000000"], 0x29) 03:52:13 executing program 4 (fault-call:1 fault-nth:31): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:13 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000280)={0xfffffffffffffffe, 0x2000000013}) 03:52:13 executing program 2: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:52:13 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x1e000000) [ 1749.458943][T10302] FAULT_INJECTION: forcing a failure. [ 1749.458943][T10302] name failslab, interval 1, probability 0, space 0, times 0 [ 1749.514990][T10302] CPU: 0 PID: 10302 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1749.524316][T10302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1749.534557][T10302] Call Trace: [ 1749.537988][T10302] dump_stack+0x172/0x1f0 [ 1749.542472][T10302] should_fail.cold+0xa/0x15 [ 1749.547261][T10302] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1749.554428][T10302] ? ___might_sleep+0x163/0x280 03:52:13 executing program 2: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0xffff) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffff3184, 0x100000000, 0x1, 0x20, 0x5, 0x2, {0x0, @in={{0x2, 0x4e20, @empty}}, 0x1000, 0x2, 0x1000, 0x9, 0x4}}, &(0x7f00000000c0)=0xb0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={r4, @in={{0x2, 0x4e24, @rand_addr=0x4}}, 0x3f, 0x2036, 0x6, 0x5, 0x1}, &(0x7f0000000200)=0x98) splice(r3, 0x0, r1, 0x0, 0x810003, 0x0) 03:52:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fP\x00', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:13 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x1f000000) [ 1749.562720][T10302] __should_failslab+0x121/0x190 [ 1749.571688][T10302] should_failslab+0x9/0x14 [ 1749.576386][T10302] kmem_cache_alloc_trace+0x2d1/0x760 [ 1749.582036][T10302] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1749.591773][T10302] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1749.601839][T10302] __list_lru_init+0x3cf/0x6e0 [ 1749.606977][T10302] alloc_super+0x762/0x890 [ 1749.611535][T10302] ? test_single_super+0x10/0x10 [ 1749.616501][T10302] sget_userns+0xf1/0x560 [ 1749.620853][T10302] ? kill_litter_super+0x60/0x60 [ 1749.620870][T10302] ? test_single_super+0x10/0x10 [ 1749.620890][T10302] ? kill_litter_super+0x60/0x60 [ 1749.630917][T10302] sget+0x10c/0x150 [ 1749.630935][T10302] mount_bdev+0xff/0x3c0 [ 1749.630950][T10302] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1749.630967][T10302] jfs_do_mount+0x35/0x40 [ 1749.630981][T10302] ? jfs_get_dquots+0x20/0x20 [ 1749.630997][T10302] legacy_get_tree+0xf2/0x200 [ 1749.631012][T10302] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1749.631025][T10302] vfs_get_tree+0x123/0x450 [ 1749.631045][T10302] do_mount+0x1436/0x2c40 [ 1749.679088][T10302] ? copy_mount_string+0x40/0x40 [ 1749.684052][T10302] ? _copy_from_user+0xdd/0x150 [ 1749.689017][T10302] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1749.695630][T10302] ? copy_mount_options+0x280/0x3a0 [ 1749.702767][T10302] ksys_mount+0xdb/0x150 [ 1749.707138][T10302] __x64_sys_mount+0xbe/0x150 [ 1749.711854][T10302] do_syscall_64+0x103/0x610 [ 1749.716466][T10302] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1749.722371][T10302] RIP: 0033:0x458209 [ 1749.727012][T10302] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1749.747004][T10302] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1749.755428][T10302] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 03:52:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fsync(r0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x40400, 0x0) ioctl$FIONREAD(r2, 0x541b, &(0x7f00000000c0)) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="2900000004000000009c06499269442973d169de8e2d0000000000000001000000d638c9b50dc1000000000000000000000000010000000000000000"], 0x29) 03:52:13 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000100)={0x0, @reserved}) r1 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r2 = dup(r1) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f0000000280)={0xfffffffffffffffe, 0x2000000013}) 03:52:13 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x3f000000) [ 1749.763496][T10302] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1749.771502][T10302] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1749.779655][T10302] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1749.787728][T10302] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 03:52:13 executing program 4 (fault-call:1 fault-nth:32): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:13 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x20001, 0x4c) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000280)={0xfffffffffffffffe, 0x2000000013}) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x88) ioctl$PPPIOCATTCHAN(r2, 0x40047438, &(0x7f0000000040)=0x2) ioctl$FICLONE(r2, 0x40049409, r2) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 03:52:13 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x670c0000) 03:52:13 executing program 0: r0 = inotify_init() r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/sockcreate\x00') ioctl$KVM_GET_DEVICE_ATTR(r1, 0x4018aee2, &(0x7f00000001c0)={0x0, 0x0, 0x800, &(0x7f00000000c0)=0x456cbedd}) fsync(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) socketpair(0x2, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendto$inet6(r2, &(0x7f0000000140)="ed8ef8061d0a0215fd02a88b16ea26ba48bc94c85ff3ce1d6fdedc44c85f617c7415e544aa5ad4c11e71c1985820ee5cad1b57bcd7f778d41671a89ba9d56cc7ac1303380d006b74643ce71e48faadb6b338b57980211b742e1e9d192000c68e5c54b151ce46f9c5c02385a02d05173f35ddb8ca53374f3b294612071cef4502defab7861f94de88e1661d174c5d0981d722", 0x92, 0x40, &(0x7f00000000c0)={0xa, 0x4e23, 0x2, @loopback, 0x7ee9}, 0x1c) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) [ 1750.026271][T10337] FAULT_INJECTION: forcing a failure. [ 1750.026271][T10337] name failslab, interval 1, probability 0, space 0, times 0 [ 1750.147009][T10337] CPU: 1 PID: 10337 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1750.156343][T10337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1750.167037][T10337] Call Trace: [ 1750.170382][T10337] dump_stack+0x172/0x1f0 [ 1750.175015][T10337] should_fail.cold+0xa/0x15 [ 1750.179691][T10337] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1750.189637][T10337] ? ___might_sleep+0x163/0x280 03:52:13 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x99f3ffff) [ 1750.194527][T10337] __should_failslab+0x121/0x190 [ 1750.200729][T10337] should_failslab+0x9/0x14 [ 1750.200746][T10337] kmem_cache_alloc_trace+0x2d1/0x760 [ 1750.200761][T10337] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1750.200791][T10337] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1750.200810][T10337] __list_lru_init+0x3cf/0x6e0 [ 1750.200832][T10337] alloc_super+0x762/0x890 [ 1750.212593][T10337] ? test_single_super+0x10/0x10 [ 1750.212610][T10337] sget_userns+0xf1/0x560 [ 1750.212629][T10337] ? kill_litter_super+0x60/0x60 [ 1750.212649][T10337] ? test_single_super+0x10/0x10 [ 1750.253443][T10337] ? kill_litter_super+0x60/0x60 [ 1750.258401][T10337] sget+0x10c/0x150 [ 1750.262222][T10337] mount_bdev+0xff/0x3c0 [ 1750.266585][T10337] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1750.271695][T10337] jfs_do_mount+0x35/0x40 [ 1750.276148][T10337] ? jfs_get_dquots+0x20/0x20 [ 1750.280823][T10337] legacy_get_tree+0xf2/0x200 [ 1750.285496][T10337] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1750.291742][T10337] vfs_get_tree+0x123/0x450 [ 1750.296245][T10337] do_mount+0x1436/0x2c40 [ 1750.300718][T10337] ? copy_mount_string+0x40/0x40 [ 1750.305657][T10337] ? _copy_from_user+0xdd/0x150 [ 1750.310545][T10337] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1750.316794][T10337] ? copy_mount_options+0x280/0x3a0 [ 1750.321989][T10337] ksys_mount+0xdb/0x150 [ 1750.326218][T10337] __x64_sys_mount+0xbe/0x150 [ 1750.330880][T10337] do_syscall_64+0x103/0x610 [ 1750.335487][T10337] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1750.341384][T10337] RIP: 0033:0x458209 [ 1750.345273][T10337] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1750.364969][T10337] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1750.373393][T10337] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 [ 1750.381354][T10337] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1750.389324][T10337] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1750.397312][T10337] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1750.405294][T10337] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 03:52:14 executing program 2: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e23, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6}}}, &(0x7f0000000000)=0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000200)={r2, @in={{0x2, 0x4e24, @empty}}, 0xff, 0xfff, 0x4, 0x2}, 0x98) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r3, 0x0, 0x810003, 0xb) 03:52:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="29000000040000000000000000000000010000000000000000000000bb510000010000000000000000"], 0x29) r2 = dup(r1) accept$nfc_llcp(r2, &(0x7f0000000140), &(0x7f0000000040)=0x60) 03:52:14 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x6, 0x4003f) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x200000, 0x0) write$P9_RVERSION(r1, &(0x7f00000000c0)={0x15, 0x65, 0xffff, 0x2, 0x8, '9P2000.L'}, 0x15) r2 = dup(r0) write$P9_RVERSION(r2, &(0x7f0000000000)={0x15, 0x65, 0xffff, 0xcbfa6be, 0x8, '9P2000.L'}, 0x15) 03:52:14 executing program 4 (fault-call:1 fault-nth:33): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:14 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0xa0008000) 03:52:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000040)) 03:52:14 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) futimesat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000280)={0xfffffffffffffffe, 0x2000000013}) [ 1750.706934][T10375] FAULT_INJECTION: forcing a failure. [ 1750.706934][T10375] name failslab, interval 1, probability 0, space 0, times 0 [ 1750.737936][T10375] CPU: 1 PID: 10375 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1750.747096][T10375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 03:52:14 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0xfeffffff) 03:52:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x29) [ 1750.757308][T10375] Call Trace: [ 1750.760626][T10375] dump_stack+0x172/0x1f0 [ 1750.765078][T10375] should_fail.cold+0xa/0x15 [ 1750.769719][T10375] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1750.776183][T10375] ? ___might_sleep+0x163/0x280 [ 1750.781350][T10375] __should_failslab+0x121/0x190 [ 1750.786284][T10375] should_failslab+0x9/0x14 [ 1750.791585][T10375] kmem_cache_alloc_trace+0x2d1/0x760 [ 1750.797229][T10375] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1750.803512][T10375] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1750.809258][T10375] __list_lru_init+0x3cf/0x6e0 [ 1750.814080][T10375] alloc_super+0x762/0x890 [ 1750.818497][T10375] ? test_single_super+0x10/0x10 [ 1750.823706][T10375] sget_userns+0xf1/0x560 [ 1750.828328][T10375] ? kill_litter_super+0x60/0x60 [ 1750.833285][T10375] ? test_single_super+0x10/0x10 [ 1750.838210][T10375] ? kill_litter_super+0x60/0x60 [ 1750.843131][T10375] sget+0x10c/0x150 [ 1750.847149][T10375] mount_bdev+0xff/0x3c0 [ 1750.851406][T10375] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1750.856543][T10375] jfs_do_mount+0x35/0x40 [ 1750.860989][T10375] ? jfs_get_dquots+0x20/0x20 [ 1750.866114][T10375] legacy_get_tree+0xf2/0x200 [ 1750.870784][T10375] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1750.877014][T10375] vfs_get_tree+0x123/0x450 [ 1750.881507][T10375] do_mount+0x1436/0x2c40 [ 1750.886149][T10375] ? copy_mount_string+0x40/0x40 [ 1750.891089][T10375] ? _copy_from_user+0xdd/0x150 [ 1750.895989][T10375] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1750.902311][T10375] ? copy_mount_options+0x280/0x3a0 [ 1750.907502][T10375] ksys_mount+0xdb/0x150 [ 1750.911750][T10375] __x64_sys_mount+0xbe/0x150 [ 1750.916443][T10375] do_syscall_64+0x103/0x610 [ 1750.921020][T10375] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1750.926905][T10375] RIP: 0033:0x458209 [ 1750.930797][T10375] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:52:14 executing program 2: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) [ 1750.950417][T10375] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1750.958822][T10375] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 [ 1750.966824][T10375] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1750.974814][T10375] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1750.982862][T10375] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1750.990825][T10375] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 03:52:14 executing program 4 (fault-call:1 fault-nth:34): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008911, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:14 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xffffffffffffccf8, 0x0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000280)={0xfffffffffffffffe, 0x2000000013}) [ 1751.257805][ C0] net_ratelimit: 18 callbacks suppressed [ 1751.257813][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1751.269305][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1751.275124][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1751.280935][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1751.286871][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1751.292687][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1751.299236][ C0] protocol 88fb is buggy, dev hsr_slave_0 03:52:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x10000, 0x202880) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="29000000040000000000000001000b0001000000008000000000000000000000010000000000000000"], 0x29) 03:52:15 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0xfffff399) [ 1751.305036][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1751.324033][T10404] FAULT_INJECTION: forcing a failure. [ 1751.324033][T10404] name failslab, interval 1, probability 0, space 0, times 0 [ 1751.347509][T10404] CPU: 0 PID: 10404 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1751.356778][T10404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1751.366849][T10404] Call Trace: [ 1751.370330][T10404] dump_stack+0x172/0x1f0 [ 1751.370356][T10404] should_fail.cold+0xa/0x15 [ 1751.370379][T10404] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1751.379330][T10404] ? ___might_sleep+0x163/0x280 [ 1751.379350][T10404] __should_failslab+0x121/0x190 [ 1751.379367][T10404] should_failslab+0x9/0x14 [ 1751.379382][T10404] kmem_cache_alloc_trace+0x2d1/0x760 [ 1751.379399][T10404] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1751.379420][T10404] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1751.379441][T10404] __list_lru_init+0x3cf/0x6e0 [ 1751.379459][T10404] alloc_super+0x762/0x890 [ 1751.379480][T10404] ? test_single_super+0x10/0x10 [ 1751.421517][T10404] sget_userns+0xf1/0x560 [ 1751.430864][T10404] ? kill_litter_super+0x60/0x60 [ 1751.430880][T10404] ? test_single_super+0x10/0x10 [ 1751.430890][T10404] ? kill_litter_super+0x60/0x60 [ 1751.430902][T10404] sget+0x10c/0x150 [ 1751.430917][T10404] mount_bdev+0xff/0x3c0 03:52:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="132b572b4ee70488fe5be5ca424f7c13b78e11084380b575ff44389334a857a7c60c5e18823bbe1d43995415ebbbe4d8d579ad6298ee9d43d262142acc76ed2728761cb6695461f5181ae6551ebc2beea6f24dec5d189013234b11e710e04e0484ec24c6857c3022180704d0b8be", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r3) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) io_setup(0x9db, &(0x7f00000002c0)=0x0) r6 = epoll_create1(0x80000) io_submit(r5, 0x8, &(0x7f0000002b40)=[&(0x7f0000000600)={0x0, 0x0, 0x0, 0x2, 0x7, 0xffffffffffffff9c, &(0x7f0000000400)="f529f5dba2b983e7e7bea595120ba975c5454223b9201648722e1b95e389ea5386e1f2ccd5322d65c4e274b444fea24e811ab2fb86310b0c6cf768ba2d6a782f2d897b016b879c40dd2daa3f0096e13bb3f42c74b4f0341e035281708526b4351ae955657f391fcae170d4bed1063ae030065c30de7419d468fe76393f80a1dba3bc4859c5d8481469ce62a87211ec20062789d32d67806978175b7387ad533df8c4d65b7ef0ab743b4a372b9c751296fc953dc9c96c8d6ef6838f4b9205db74e954a90025139111353ec03f06adfa6f044a7b801a36cdff6912ccc4f43e5fba11eb", 0xe2, 0x2, 0x0, 0x2, r3}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x3, 0xffff, r4, &(0x7f0000000640)="d1f7baaa6dbacc376bd8f8c14e595715533080194c4d9142c1e58fd7589cb9c80f9117770af427275e5dbde82a5cf7f08c3b703cdb29f5cd7c81c52cf174f165e14c90eab5322f19ed35b72ab5c0dc15af9f5ca43c819f5ba30d6ee1186d27b645b5291357346725cc3298eaa5d61291892f872ab8e8edfa23fae299f46a341fff33f135", 0x84, 0x400, 0x0, 0x0, r3}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x7, 0x9a, r6, &(0x7f0000000740)="f02e919fe865a089323bb39a", 0xc, 0x9, 0x0, 0x1, r3}, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x7, 0xc00, r2, &(0x7f00000007c0)="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", 0x1000, 0x3ff, 0x0, 0x2, r3}, &(0x7f0000001900)={0x0, 0x0, 0x0, 0x7, 0x4, r1, &(0x7f0000001800)="e2b660d032e6099c8cbc98819eebc8d78e337939e312d670f38bb243e3dfd35ab88632803ba2a7d2820b47596551169aabef9da60a9dbebbc34639e6216b64ee81f5f4bfa15b6d132db4ebf0093c223cebfca966f6c4f873adb1f10f043ca35da846e6f3d49dbdeb8008fef7516f526791be3d8790e53e0097477886602fb986ef2a43bfd4ad789be06af339fcd24d846f93eea4022ae7de97eff835fd44276ea140a12545711a4565f45e676293c6c7421212f4edc0a9a678f57c08290329ba991cdc554e", 0xc5, 0x200, 0x0, 0x2, r3}, &(0x7f0000002940)={0x0, 0x0, 0x0, 0x7, 0x6a7, r4, &(0x7f0000001940)="919430db0d9b54c65ee900db67dad2df4b9849ad20fb8a9526fd07b182c2d717e8cb869cc91985c17bbdff756ec273e4099666aae8866eea7a7c40d6f7a3f1e48a3e9203e9a9be250c2f4cdb79d5fa35df22e15bc49ff27d10cf18b063f5269b05ec20c4f104389e56a91467871be0794656937da6b3daf086cbf4433ad6653ad1cee303ad9519b01a54626751301fdffdd48f3ac80dd81d779a4c57ca6620355c609220ca85ad03832014e185277db8627e4492c2b917ab1c9caf74146f4c5d02d39328cf465f549874d89593902e22d33a2b57f30c391c156b1b1c41386eeeaf3dbba062c024f3f289ba01d491819e34f5a53c419d3c2a48c5d2496865b2366328e546bd73f1c2b551a4bef43635d806eccccf5e46d0c8299aa0b8f9d78eea7a3e41b996704d043086071d53c4b7f067f1b8baa5ea5d70ec27add620cdb56beebea268c66c0a2b87b0c59373a6c3787dae7a8681e65c59d30ff464bc6653fa3cdc85cb04e8be00ec758bee8ed75b13302d4b2bc1b6e6effe26dcfb7023a89d12c8f47f457d420d6abfae071aabc9f1ec15b1c3d7074e9fe29a8f050f24b22b275639e05162b9c7bb1da5e9168529676e4281fd84b807a3f742c2704e985431a4538881b5ffa414548392746d881dfd4f12d8cfcb2cefa63a8b4975537e113721cb8c9aaa5a9df75a9cfc015b41d0b667369deb59e8b04e37b15e687a7072ec926df1788ac60dd019ecc7fd3146fda12f9925296d2c143263da9616d83a9c29366d4f5f962689e2db1d876061a0508466836744e2510a6ae186d5233c9534320311f4f8609339ec5aecafaaf63e93aefe13baebabb9e395e0a56c202355be540cad8a8821d5adba42d4eb5c3e8f459e928589a6c78e7ee4fef3270db066ef44deb7ca1445477862adfe9b4abde408b2337872dd06b467bd8aaa96a6aa0c90542f7e189b6d952d5bce2f7509da0959914d09b2fe8043e0c997d4cd09de3d202f538e077301bd575d4c0ca9498b2f119b8738d02e3590ef2bdf49c6cd4ad2c2eecc33168565e5dc09fa9df39aa5735e0e0bb00655a883781492a6f4c6677b762c16f957687107eb336f4b93e48ff729d46ad600b431a1712a6dc861dc6c7da40075c2c1f570cd80ada73c7029a6075d706462c5426cd0439e4df73ac899d08fffc12223c9050745fcf49b88aab4be346927a94e36969dbe82b22d36170fa974f6d6e459785e9d7b99e785646057582ec440d97ce9cff19ed654e28ce434cd79c0dcd43f20161593af6b05117ad267575735977170ffa2b765895bd4bc18724ff770d5e1384a10e0ef6d4f3e094c6e840d03aa049982c9ee016ac394326f2d03966ed3d5b7e73e44cc3f22c25ce03a50515d9ebac829e8ad568328071a6d34cc24637cb816ac779e5aea8d50e17814c4ae047ef6ed8cb385bfa38aa202be589e8665459157b7614b343138900a4c91e3e46e98f7dc2178aae37631bce27ce429cd27f357b5b3d6b5c6ad003cce64897bf3124d928d216073bb39f0b1c3a8b83e7e3bf1fd709d09c89d3b4af895096986f6365f0d7db2b6567cae5304021a26aac6d61821d9fca36ed76f792a675e0d4ba390fc0ec7a473cfdf737e9b3c9af38265329038120f58d37af4dc42ee858451df4343182272207f753540284e0f07995b692a90d203398f12523905cbfaab204e0a2ac08df22da6c095d970625f0bc291ba8e32266f2f8330d55520d2c1b4cb961bf8799c46662342c0662f72c2d07f2f0827b3ff0fa24b5b541f73c4fe76e6ff9cd659becb133528048033fbed0969f32d1c1a6382ba0e54ef19937d0b18eaec901844119a982be208ff426f476cc03673750bf99a78d5f7ef207b47118e7fb105f8228d46a301950f73cd87a12778482628d3f773fe696d582c8b573607c7492e4246a6f3151e5a44301160117f969cf08dc77e859eeac5c8413794fa43fb159cd7cd527b6ecddb9fd05697e5030dc16652f17f942520761be4a84243f864e7c7f8d2a5e253f721712ea4dbbe14841301670c1e29b71d7411bdeadd0c4470c004b860266fc1bb413f885015756fa2f73264a21f2a6ec78d45f93ac8bb8dd0036a377701180e06d812623a54a03b74a76a5a1990b1d9158e48d2e001d91a28b4c67a97b3a2c707d4b629dc8b374e6d56d57e0fa3cfab03a278438a806972166c9d32b69c2d71bb7817834b03aa0fae58c065d02b50de646a04ca5b23a998be1dd52d3e35e147ce5920f63ae87cddb2e32ebe0fce04e4fdeb225f55469c65d57cc61d1660aaf8be0df7fb2f4ab0d58d2c8fbf99fe073e495093d43a5df1f5640534e769e8f7308160f68423b47823112309f48d812830347adbdc9ebb2161f61f0ef8e013df08e05a66cda750fa81769fd9c46870aeaaf0326c69c4ad45440abb720fe5bfd57f34cbc815c00504b60a47d925915dcadd982bbb69f0af23c01332f3412b4792f94e3b0ce036d5bc3ef20393a34a8759ec88fab55550bfd9f21bb8eb837c8bb1314e4bcf7120f009737592df564c9aec31d9590ebcf5d737589d7881960b01d1756b987be9a5e98b2b04d1fbcf5826ccb1a191ce37560db776a5ca5139021692742125d1343c1ef328c7c745892d4ed72ca3237994bb395f62dd4fb9877cdae23a0d026c565b434f05580399e081981ab84cad278b783b629ac11e45d3d134963321514fd54382cab22cd77b40e00360cc27708071cc3443f8d5171c2b81d3242ac644eea8643fe29aa91d48e2ef531148753887f125de58c1cba5e11f6a5c86cd0534627dc9d62ddbe1fb48398d6a5dbf44fd0d00a9ba48ffcca61ea7780dcc98b838fb1101d6b230817985e4c0c06cb370691fb42379cd2025b9fb66482dda500ef92959310ed45d051c1ff8a1a643cea65f09b94e2c3479337a4a407dbb5ba77219e25ed26a46d94fcfdc24b535709903b092b6b260765c2f6f0972d17135d289b4f3088cf6482c1d0f246ac9b3efa70369f7b13615381cdd8e41dc3cd016df015a4c5520f288cdb9b2cec92b4c86e6dc8646f6d7c4b56672f635507dae09d5316430728e224a11f3828315ff2113fb9e261caaf8ec1a88d00105b975c24b2f264867bb5a4812f5dc03d52cfa86b72215e8a344ef00a5b8166f3a5e429a4bd0566d34b63bd5b3e6ee5a647b1d729acf1d99099ddbbbcb91e016e2b221859adf203b8231b421de5923d59bab28a13e001394159acd2237a950907165f79fc84c0dd737c6051dfb43c0fe7e63d6f7d8cb837a63ed077652df18772c04b77625789a6e75c9be52e33ec00da0dc9d4799f4d32e82d30ef52a590c4311086c472fbed41091c88b6e9f695fc21253f92a5dbdcc3f0a43c865e963e40892a1f67be53ef3d2da17a23f89aeaebde58d772801ef390f17422c574b25453a48d9cafdc2f17e586fece063f0ba376dc68e76495fab66ff9c87804698f0db44bb852b919534206f5a58c9ec15e250168b33084cefef539fdc22f5baabef45968b5206ddc0c525823fff873e05febcb050bcf75c52987d7df8acf19e6f7504342d35afb4a6bc216d6f4c1fa56ef7685b56c3b68251c250a1ad4f66f71ab4703f001d7f4ccb0444023c79dab0bce0c7997261b909e83e8594c95da45ddfc6e8a21ee9bf5cc5de00e6f82cc4345234da61b1ba6f15366a76a86e1e830752afe5dfb518e969df522ccf4084a9c125acd29228d1c8d8fa9f28f3c4b441588ec4235a285b81d47b6bb7f5983b519cc3ef80040134473a4a8b9efc8c2944d7b9bd29f9fd6249d3d074081c6ee9ac73319bf5225ffd0f3a96c6a2100e214d56bf1f2940df97ffac1be95f5908287dc873b60000af85391b39989e1721916e0208f37091f2c7031e2cf049a0f5fc157d8764a1135fb79e8cc39d4b6b7916c33da478f4f100ce6a013283fdaef087cf3caf62f7884a2c57c2af44e23d1768393a2e3ef96e15cb8502b2780ab75c089878edf6b7466bfba4376fe1ede8462c797f68d35002f8b4fb05d93eabba4b04325843ce214d1d3c5c5a2ce2770983d4e790c6334abc14d23f09f456a6f8d9234062617685818bddba276af3e641690da7e06a763c44f82071912508765fb9c9d23d9c4ec3a1beff53599ffee61ae3a0b2a47cdb67ac09b8ab6db3e4fa13c54b7c28157acac9d69baae3c7a3a28bef7ddfd7cc3ede062acb453ef86ad634d89a90ecbf1ee23c94d9c25d69e8286a9dd18d672c58bf93a1a6001f5a2c6a782fc3d1f7b0b7b0551f6aef040e650060e2225460a2cd9feaed29b5607e42f5bb57597ab4f7dce5bb807718c9ad9883993570cd682d8ba7b30d76beecf7cfb43d96e0544f1d7e5484a11e1874f10518e6da52c24367338d439872d864fc94642ce7cd6a7f7e2583a1beef104e9e57bca4663da3a2cd48024e83ccf002164e4fe755a37a55872e8ea17fcb5590cb44f754473f1b5b16d2b5869e0b2a862caff523ba44bd63c0310faea6b12959cfab9c40bc5e27b10384f0e28b7e5b18379fe4df47a7d405d8563d186678cde1d8298c68324952ced8fb597fe2c0058a35f372e310983e04839fd006d7f3a440de205e9ae91af21eb1e3790b9815ae3ec921ddc0a5ee6e5056ad5cc0c7e9e04baaf928f7a1749a8ab4d9b0aeb8693dc07917816f498f9685fb97f0ffe7fc644b27215304dda4b039d4211cc5537f2333b20df28bc2b339411f2d8b56384791f78595e7d5ce05e25d428d10474ca43d45653aa50de3f0cf4aa80946ecfb37ff9c0248ffdd43ab0b0ff77216846f28f142d19b06ac2c36795305c4d04c7bda8f9f47f98c674f8edea894819da46d05ce0708d5fc545cdfb70851ce1821814242996819973b4f34c4263710330762a1b703987b65e844efb66b7f25d20e1ee7d987faafa868b42f379a38231352eba582c1387e21668b72abb4455d7ce55d9ce86f7d1b35dcf0b779a97bbfe4c9274885c94855801764bb578f6d7485380aeb6e4e3caf3cc0605892ea2cbd5966787356942fa40ded421e9cb0047fa38749624c04631ca371ec296662c3da9d1bca2d3a5db6fd552b9e6d917058b65db19f16dd8d1cdb778f5c501b6699dec02cfc3966ec23f00d17999ffc9315f3e330b23ba94bab659b88303750721848f33316b0987edef8035736bd6002ecdc2e97fb87f29edb54343c1dfa9ea7dead77dec23ac7866ffb362248a4ddfb27e9063ec28679bf0d20bcd6a61f231f3cdf11b1945aa73e2ecc457f09bab3424cbab1f1f773f0555b5520cc25e89283b3827455db0feaf0d64a96fe0c2e84bfc9c7c4931d40364d062fd369a5a6cdc286fae31bf08723141e723ff020ae1b39da8a6e8a7a50a25575e5953d768b6d5b145d5610b66503a5ed218f8368355d6b406ad6c0de46552fbdbc0d3f3695ec74ac5eff85474eec82f8d6ffb30a2a2eea0294e0750f6e6d197e14973e46918b4253d2c1f5c64d54a6aff99b1c7ecaa07213f59e8816dd8411e54be7af8b3429b16dc6a19b99effc23632dd4e517c6bc4c090947db307bfbbf9f31fce0fce6f7342408a281171fbba5abcee0f6f0573bbdd46903b02554314d1b57d104272b022089383152e300cbdefab32e9fc6756acb2883cb0ce893f6a9862ea9892b14c9abb5623f211ae8b6c1f062014c029e3b974883ceef306aaf32e962b2e68dead71941676b3198eb483f2302832f495daf1f909f1c655e32218b2db6ae8e24e4d5524a0e91d02c31543bd0dacdda2c2cf7ed80e66c75f88fedfe55968a43b2a0d0958e53bcc16560088daedf2399b2e24932d229435c", 0x1000, 0x7cc5c5, 0x0, 0x0, r3}, &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x5, 0x40, r1, &(0x7f0000002980)="349b9155ebbafc7511b4cd306c5c17fb6d71b4b6f3392acd28e52e30104debfee6f46040079ec10e7d298026a72411086bd8b2bcf55d9b4d8d5650eb81b94198f4acd780235d3d460bbdd49c959600ea8c40543d296e6aa424be18146c68e38e8d4c7644953b5fd617e883131bb7e1bd8012d5a18a85df478b17b587e3fa3aa80c879116259f1f46a1461944c0619129f8f11e2d1f84fa8a6be5fe0347a52eb711ab5660dfd9294f6c7cebfea250b0bf05714f577235b748d826210dfc0088441c87b090f0a6f2c3beb0aa70f43c4784e37fc349eb959671375f995c53e6da029c", 0xe1, 0x8, 0x0, 0x0, r3}, &(0x7f0000002b00)={0x0, 0x0, 0x0, 0x6, 0x4, r2, &(0x7f0000002ac0)="1771d85961e9ad9b043ba38768fa34560de8c031e4da89b3e56e2232d27cf538062d3a5e509c2f71c3326fc0ba9d918c309694", 0x33, 0xfffffffffffffff7}]) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='mime_type)vboxnet1,$trusted\xee,vmnet1keyring.posix_acl_access\x00', 0xffffffffffffff9c}, 0x10) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0x2}) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0x2) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80) syz_init_net_socket$llc(0x1a, 0x1, 0x0) r7 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x5, 0x203fe) ioctl$KVM_PPC_ALLOCATE_HTAB(r7, 0xc004aea7, &(0x7f00000000c0)=0x80000000) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_tables_targets\x00') openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) r8 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x2) write$FUSE_NOTIFY_RETRIEVE(r8, &(0x7f00000000c0)={0xffffffffffffffd3, 0x12, 0x100000000000000}, 0xfffffefd) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000002b80)=ANY=[@ANYBLOB="2900000004000000000000010000000000000000000003000000000120002364f93ece2d9405c2d98e2491ba000000000000e1a3c6fad6457a92c0fd9ea2443207c8e0167a20b05e5b6f4532c439afcd309a5bd11c3fdc07e77dd0ca3b1dacde6e9d26a025d8fa9fced52cdeb50802d38ab0afa3187b52259364f18c5af6e75cb83fb1069e6a82c63fc03bbe2965115964b1335ff71c8f76825f1a82487187e55b450c76fe24ac258d8b6e373599892e83f0a6098e7fa09fb938ac6fcaaf3844b6aff87d01fc"], 0x29) [ 1751.430932][T10404] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1751.430950][T10404] jfs_do_mount+0x35/0x40 [ 1751.430971][T10404] ? jfs_get_dquots+0x20/0x20 [ 1751.472614][T10404] legacy_get_tree+0xf2/0x200 [ 1751.477302][T10404] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1751.483570][T10404] vfs_get_tree+0x123/0x450 [ 1751.488086][T10404] do_mount+0x1436/0x2c40 [ 1751.492519][T10404] ? copy_mount_string+0x40/0x40 [ 1751.497466][T10404] ? _copy_from_user+0xdd/0x150 [ 1751.502342][T10404] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 03:52:15 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r1, 0x40405515, &(0x7f0000000040)={0x6, 0x7, 0x80, 0x81, 'syz1\x00', 0x100000001}) r2 = dup(r0) prctl$PR_SET_TSC(0x1a, 0x2) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000006c0)={'bond0\x00', 0x0}) bind$xdp(r2, &(0x7f0000000700)={0x2c, 0x6, r3, 0x12, 0xffffffffffffff9c}, 0x10) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f0000000280)={0xfffffffffffffffe, 0x2000000013}) socket$bt_bnep(0x1f, 0x3, 0x4) 03:52:15 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0xfffffffe) [ 1751.508606][T10404] ? copy_mount_options+0x280/0x3a0 [ 1751.513825][T10404] ksys_mount+0xdb/0x150 [ 1751.518084][T10404] __x64_sys_mount+0xbe/0x150 [ 1751.522787][T10404] do_syscall_64+0x103/0x610 [ 1751.527412][T10404] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1751.533491][T10404] RIP: 0033:0x458209 [ 1751.537397][T10404] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1751.557110][T10404] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1751.557126][T10404] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 [ 1751.557133][T10404] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1751.557141][T10404] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1751.557148][T10404] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1751.557157][T10404] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 03:52:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000480)={0x1c4, r3, 0x900, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6055}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3ff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0x84, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4c}]}, @TIPC_NLA_BEARER={0x78, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x29}}}, {0x14, 0x2, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x23}}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x145}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2c73}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7d1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'team_slave_1\x00'}}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x68, 0x5, [@TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffff27}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}]}]}]}, 0x1c4}, 0x1, 0x0, 0x0, 0x40}, 0x800) 03:52:15 executing program 4 (fault-call:1 fault-nth:35): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:15 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000280)={0xfffffffffffffffe, 0x2000000013}) write$UHID_CREATE(r1, &(0x7f00000003c0)={0x0, 'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f00000002c0)=""/252, 0xfc, 0x3, 0x81, 0x21bb, 0x5, 0x2}, 0x120) setsockopt$CAIFSO_REQ_PARAM(r1, 0x116, 0x80, &(0x7f0000000100)="3436ac6dd2551aae3953e2f20c37c50b800e7eb45f4bc445fce330b17574c7fce6c21b5b18a71af85acf11c2949eba9363003b218ca18bcb0697233d07975216f5d1d254af4874ea5be85ba25bb126795e12edbe779ad16ede51d1b98bd56ec3ebe1a9496ea8520dc4f8dbb41247fb00a576c7a8f365dff9fee43b5aebc0eaa631b62aba46556f1eb53c2fb2663a7ae81f452de8dbe19b9c4a09d3aa5e8050ae9d3307f17460e1d5ebb1651dc34fb6120665e075c93963026361533b5ae17a15d4607c79cd38f0c062f27e347fec589ff9345bb561f6b0383e59d3ddd609ee7aeef00b118cad42a3", 0xe8) r2 = dup(r0) sendto$netrom(r2, &(0x7f0000000040)="055412267b7eada1cfcfac21c6e46f160968f5640afef9409af73ba0eb8cbb919c3e8187d906804bfc6b70cb4cdd33", 0x2f, 0x4000, &(0x7f0000000200)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x3}, [@bcast, @default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}, 0x48) [ 1751.892467][T10437] FAULT_INJECTION: forcing a failure. [ 1751.892467][T10437] name failslab, interval 1, probability 0, space 0, times 0 [ 1752.014522][T10437] CPU: 1 PID: 10437 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1752.023672][T10437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1752.033747][T10437] Call Trace: [ 1752.037074][T10437] dump_stack+0x172/0x1f0 [ 1752.041437][T10437] should_fail.cold+0xa/0x15 [ 1752.046055][T10437] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1752.051893][T10437] ? ___might_sleep+0x163/0x280 [ 1752.056767][T10437] __should_failslab+0x121/0x190 [ 1752.061723][T10437] should_failslab+0x9/0x14 [ 1752.066241][T10437] kmem_cache_alloc_trace+0x2d1/0x760 [ 1752.071634][T10437] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1752.077468][T10437] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1752.083141][T10437] __list_lru_init+0x3cf/0x6e0 [ 1752.087938][T10437] alloc_super+0x762/0x890 [ 1752.092367][T10437] ? test_single_super+0x10/0x10 [ 1752.098647][T10437] sget_userns+0xf1/0x560 [ 1752.102991][T10437] ? kill_litter_super+0x60/0x60 [ 1752.107940][T10437] ? test_single_super+0x10/0x10 [ 1752.112972][T10437] ? kill_litter_super+0x60/0x60 [ 1752.118014][T10437] sget+0x10c/0x150 [ 1752.121841][T10437] mount_bdev+0xff/0x3c0 [ 1752.126212][T10437] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1752.131363][T10437] jfs_do_mount+0x35/0x40 [ 1752.136058][T10437] ? jfs_get_dquots+0x20/0x20 [ 1752.140770][T10437] legacy_get_tree+0xf2/0x200 [ 1752.145457][T10437] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1752.151719][T10437] vfs_get_tree+0x123/0x450 [ 1752.156262][T10437] do_mount+0x1436/0x2c40 [ 1752.160608][T10437] ? copy_mount_string+0x40/0x40 [ 1752.165544][T10437] ? _copy_from_user+0xdd/0x150 [ 1752.170960][T10437] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1752.177991][T10437] ? copy_mount_options+0x280/0x3a0 [ 1752.183319][T10437] ksys_mount+0xdb/0x150 [ 1752.188197][T10437] __x64_sys_mount+0xbe/0x150 [ 1752.193056][T10437] do_syscall_64+0x103/0x610 [ 1752.197673][T10437] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1752.203592][T10437] RIP: 0033:0x458209 [ 1752.207487][T10437] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1752.227585][T10437] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1752.237827][T10437] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 03:52:16 executing program 2: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x400000) accept$packet(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) unshare(0x40000000) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000180)={0x0, 0x87e, 0x0, 0x6}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_ADD(r0, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100), 0x1, 0x0, 0x0, 0x841}, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, 0x0) 03:52:16 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x400000000000) 03:52:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2900000004000000000000000000000001000000000000000000"], 0x29) 03:52:16 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000280)={0xfffffffffffffffe, 0x2000000013}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x100, 0x0) [ 1752.265187][T10437] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1752.274656][T10437] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1752.282631][T10437] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1752.292704][T10437] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 [ 1752.460298][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1752.467510][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:52:16 executing program 4 (fault-call:1 fault-nth:36): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:16 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000280)={0xfffffffffffffffe, 0x2000000013}) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x8, 0x402) [ 1752.520219][T10455] IPVS: ftp: loaded support on port[0] = 21 [ 1752.977324][T10455] IPVS: ftp: loaded support on port[0] = 21 [ 1753.032274][T10468] FAULT_INJECTION: forcing a failure. [ 1753.032274][T10468] name failslab, interval 1, probability 0, space 0, times 0 [ 1753.054257][T10468] CPU: 1 PID: 10468 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1753.063395][T10468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1753.073466][T10468] Call Trace: [ 1753.076780][T10468] dump_stack+0x172/0x1f0 [ 1753.081134][T10468] should_fail.cold+0xa/0x15 [ 1753.085749][T10468] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1753.091581][T10468] ? ___might_sleep+0x163/0x280 [ 1753.096440][T10468] __should_failslab+0x121/0x190 [ 1753.101379][T10468] should_failslab+0x9/0x14 [ 1753.105914][T10468] kmem_cache_alloc_node_trace+0x270/0x720 [ 1753.111742][T10468] __kmalloc_node+0x3d/0x70 [ 1753.116246][T10468] kvmalloc_node+0x68/0x100 [ 1753.120739][T10468] __list_lru_init+0x4a6/0x6e0 [ 1753.125484][T10468] alloc_super+0x78d/0x890 [ 1753.129881][T10468] ? test_single_super+0x10/0x10 [ 1753.134801][T10468] sget_userns+0xf1/0x560 [ 1753.139144][T10468] ? kill_litter_super+0x60/0x60 [ 1753.144097][T10468] ? test_single_super+0x10/0x10 [ 1753.149018][T10468] ? kill_litter_super+0x60/0x60 [ 1753.153959][T10468] sget+0x10c/0x150 [ 1753.157766][T10468] mount_bdev+0xff/0x3c0 [ 1753.161995][T10468] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1753.167099][T10468] jfs_do_mount+0x35/0x40 [ 1753.171430][T10468] ? jfs_get_dquots+0x20/0x20 [ 1753.176097][T10468] legacy_get_tree+0xf2/0x200 [ 1753.180761][T10468] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1753.187015][T10468] vfs_get_tree+0x123/0x450 [ 1753.191598][T10468] do_mount+0x1436/0x2c40 [ 1753.196115][T10468] ? copy_mount_string+0x40/0x40 [ 1753.209045][T10468] ? _copy_from_user+0xdd/0x150 [ 1753.214112][T10468] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1753.220486][T10468] ? copy_mount_options+0x280/0x3a0 [ 1753.225687][T10468] ksys_mount+0xdb/0x150 [ 1753.229944][T10468] __x64_sys_mount+0xbe/0x150 [ 1753.234702][T10468] do_syscall_64+0x103/0x610 [ 1753.239307][T10468] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1753.245210][T10468] RIP: 0033:0x458209 [ 1753.249115][T10468] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1753.270745][T10468] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1753.279171][T10468] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 [ 1753.287327][T10468] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1753.295293][T10468] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1753.303253][T10468] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1753.311237][T10468] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 03:52:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x7fff, 0x100000000, 0x80000000, 0x3, 0x100, 0x7, 0x10000, 0x200, 0x3ff, 0x81, 0xb80000}, 0xb) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:17 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0xffffffffffffc) 03:52:17 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:52:17 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x337, 0x0) r1 = dup(r0) syz_mount_image$hfsplus(&(0x7f00000000c0)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x81, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="bef3768e368b62296def6872e7c19e4d09f0c2b6267828c2a3b8bb61709b0c8ea9d2407d4c2a3442a61a877fee9b09bd2fcbb341f4a55bbea9227dd35c0e24c5da0cfac7d6fb6929a85f6898e590aa25a779f0f20c7484255a25e569985c9bd4ba7153de5fd43d06ccf09b9d39ff828aa017ee79f35af4bf6a76e741a703ebb95ef781563094b983340494d262cde654b10bcd9d24e176ad4464830c496371119301046583da3fb79cf4fd0001feff92b58d30692135ee314eec1d2383bab3", 0xbf, 0xfffffffffffffeff}], 0x104402, &(0x7f00000002c0)=ANY=[@ANYBLOB='barr\ber,barrier,fscontext=root,context=root,func=MODULE_CHECK,appraise_type=imasig,dont_measure,\x00']) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)=0x0) migrate_pages(r2, 0x8001, &(0x7f0000000040), &(0x7f0000000080)=0x800) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000280)={0xfffffffffffffffe, 0x2000000013}) 03:52:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0300"]) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:17 executing program 4 (fault-call:1 fault-nth:37): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1753.502164][T10489] FAULT_INJECTION: forcing a failure. [ 1753.502164][T10489] name failslab, interval 1, probability 0, space 0, times 0 [ 1753.557890][T10489] CPU: 0 PID: 10489 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1753.567041][T10489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1753.577131][T10489] Call Trace: [ 1753.580444][T10489] dump_stack+0x172/0x1f0 [ 1753.584818][T10489] should_fail.cold+0xa/0x15 [ 1753.589480][T10489] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1753.595338][T10489] ? ___might_sleep+0x163/0x280 [ 1753.600206][T10489] __should_failslab+0x121/0x190 [ 1753.605160][T10489] should_failslab+0x9/0x14 [ 1753.609675][T10489] kmem_cache_alloc_trace+0x2d1/0x760 [ 1753.615059][T10489] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1753.620908][T10489] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1753.626587][T10489] __list_lru_init+0x3cf/0x6e0 [ 1753.631373][T10489] alloc_super+0x78d/0x890 [ 1753.635829][T10489] ? test_single_super+0x10/0x10 [ 1753.640779][T10489] sget_userns+0xf1/0x560 [ 1753.645123][T10489] ? kill_litter_super+0x60/0x60 [ 1753.650084][T10489] ? test_single_super+0x10/0x10 03:52:17 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:52:17 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x80000000000000) 03:52:17 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f00000002c0)={@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x2, 0x0, 0x4, {0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7fffffff}}}, {&(0x7f0000000100)=""/249, 0xf9}, &(0x7f0000000000), 0x3}, 0xa0) set_robust_list(&(0x7f0000000040)={0x0, 0x8000}, 0x18) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000280)={0xfffffffffffffffe, 0x2000000013}) 03:52:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x5, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000380)={0x0, 0x80000000}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000480)={r2, 0x10000, 0x8, 0xc6, 0xffffffffd94d380b, 0x5}, &(0x7f00000004c0)=0x14) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f0000000640)={0x7a5, 0x6, 0x3, 0xa2, &(0x7f00000006c0)=""/162, 0x1000, &(0x7f0000000780)=""/4096, 0x32, &(0x7f0000000600)=""/50}) connect$caif(r0, &(0x7f0000000080)=@dgm={0x25, 0x1, 0x1}, 0x18) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000240)='./file0\x00', 0x0, 0x10}, 0x10) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000500)=ANY=[@ANYBLOB="210000000402000000000000000100000100000000000000000000000000000001000000800000000026d1e655095d53325ca6de84d0bbedd13137cc95f8688bdb4a3520e7d394564414fa9fe9432b8944200b158240b188aef6239ee50831968a5cf09a0e9dd49648ef6c93a0a758c23a7a58c311bc2feafecb9422a4e14acb6b5f265ed830dac9c3b969ecc15876da35f5eef60d8c67a5d455b95324bea9f572c5d105009dfcd685b2bcebe6c270576766014f012d3018db6b5441756af4a148259b393eeb573d0815b4747e4703892260d69ab6c7d48b8bc046acc71c49d4a9636e7d"], 0x29) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) perf_event_open(&(0x7f0000000180)={0xfffffffffffffffe, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000180)=""/184, 0xb8}], 0x1}, 0x0) ioctl$VIDIOC_G_INPUT(r4, 0x80045626, &(0x7f0000001780)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffca88}, 0x80, 0x0}, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r5) r7 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r7, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x5b3, &(0x7f0000000680), 0x1}, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000140)=0x4) getpeername$netrom(r4, &(0x7f0000000180)={{0x3, @default}, [@bcast, @netrom, @rose, @bcast, @null, @netrom, @netrom, @rose]}, &(0x7f0000000200)=0x48) ioctl$FS_IOC_ENABLE_VERITY(r1, 0x6685) lseek(r3, 0x0, 0x2) [ 1753.655041][T10489] ? kill_litter_super+0x60/0x60 [ 1753.659991][T10489] sget+0x10c/0x150 [ 1753.660011][T10489] mount_bdev+0xff/0x3c0 [ 1753.660025][T10489] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1753.660044][T10489] jfs_do_mount+0x35/0x40 [ 1753.660058][T10489] ? jfs_get_dquots+0x20/0x20 [ 1753.660075][T10489] legacy_get_tree+0xf2/0x200 [ 1753.660091][T10489] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1753.660106][T10489] vfs_get_tree+0x123/0x450 [ 1753.660123][T10489] do_mount+0x1436/0x2c40 [ 1753.660143][T10489] ? copy_mount_string+0x40/0x40 [ 1753.660158][T10489] ? _copy_from_user+0xdd/0x150 [ 1753.660175][T10489] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1753.660195][T10489] ? copy_mount_options+0x280/0x3a0 [ 1753.673414][T10489] ksys_mount+0xdb/0x150 [ 1753.693321][T10489] __x64_sys_mount+0xbe/0x150 [ 1753.693342][T10489] do_syscall_64+0x103/0x610 [ 1753.693366][T10489] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1753.707139][T10489] RIP: 0033:0x458209 [ 1753.707156][T10489] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1753.707165][T10489] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1753.707180][T10489] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 [ 1753.707190][T10489] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1753.707198][T10489] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1753.707207][T10489] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1753.707216][T10489] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 03:52:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x3, 0x4000) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x100, 0x1ff, 0x0, 0x1, 0x7}, &(0x7f0000000140)=0x14) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000180)=@sack_info={r3, 0x19, 0xffffffffffffffff}, &(0x7f00000001c0)=0xc) 03:52:17 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x8000a0ffffffff) 03:52:17 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x1, 0x400000000201) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) openat$vcs(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vcs\x00', 0x200, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'sm3\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) splice(r1, 0x0, r5, 0x0, 0x80000700, 0x0) r6 = dup(r0) accept4$nfc_llcp(r0, &(0x7f0000000000), &(0x7f0000000080)=0x60, 0x80800) ioctl$KVM_GET_ONE_REG(r6, 0x4010aeab, &(0x7f0000000280)={0xfffffffffffffffe, 0x2000000013}) syz_mount_image$nfs(&(0x7f00000000c0)='nfs\x00', &(0x7f0000000100)='./file0\x00', 0x2, 0x4, &(0x7f00000004c0)=[{&(0x7f00000001c0)="37afbd8ea595b680e17390e171447ba7172f9757a6e06aca83aaf8bd70a0d66586c10aaa530f456f8f7b3b2ead790cbe61b706cd63dc0cc4cde4656cc3d813530cfd283a2a4615908e8f9f7354eca7e914500e29a987d75a2138196e4954fe0bbe234df4efc8cde728e8006a2f06e0da8bd232df3a5d652afe396353c3907ed00b2957798c3f7eea14ec8dd28b65329213426878a36559ac0e24ac11a3ff5d7c1626ba7ae0a33bd9e9babb9d9746436ce4764e0c0da62b4834dd2da5", 0xbc, 0x80000000}, {&(0x7f00000002c0)="607d90277a4fa59ec9ce6ad25b1b8cc6acfebe18cfc80b2fa2ea78c342ebdf593f0d7d6f90ba2faa039d8ed9b1d6142a18cacd8be42560645dd3e41946b6b9694c0b3f337af244cc2f806772c5e027b0db84e7cecd91b3642bf7ae9f554216fd5edd701b65f98bbc4253b85a6072b62e19c00171f4762c2bc1495c36905529c19b769b5aad0cb8801f31d91b63c8b71aff971c2466a542a8c23e5dd2341d435edbb4082ea2c2e70b0470b6bcf277a4591105952e5a261fef1d2d5f9d5efc5998c337e228fdd398ca098c07d8833488b73b5c32613bf26df173359806a403cbf2d5", 0xe1, 0x100}, {&(0x7f00000003c0)="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", 0xff, 0x600000000000000}, {&(0x7f0000000140)="85c061fc9a6d5efabdb1a072cebfb186861c724c3108bffe53f90fedc591afa000e65378f4b3954aed13194d41557873", 0x30, 0x9}], 0x1004000, &(0x7f0000000540)='/dev/dri/card#\x00') 03:52:17 executing program 4 (fault-call:1 fault-nth:38): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:17 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x100000000000000) [ 1754.045625][T10526] FAULT_INJECTION: forcing a failure. [ 1754.045625][T10526] name failslab, interval 1, probability 0, space 0, times 0 [ 1754.074351][T10526] CPU: 1 PID: 10526 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1754.084016][T10526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 03:52:17 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000280)={0xfffffffffffffffe, 0x2000000013}) read$rfkill(r1, &(0x7f0000000000), 0x8) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0x80045301, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f0000000080)={0x6, 0x6, 0x6, 0x100000000, 0xffff, 0x3}) 03:52:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000640)={'filter\x00', 0x4}, 0x68) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/route\x00') r4 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x4, 0x80000) r5 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x6000000000000000, 0x40) r6 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x2) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x2, 0x0) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0x121040, 0x0) r9 = syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0x0, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0xe, 0xfffffffffffffff9, 0x2, 0x476, 0x0, r9, 0x4}, 0x2c) fsetxattr$security_smack_transmute(r10, &(0x7f00000005c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000600)='TRUE', 0x4, 0x1) r11 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/autofs\x00', 0x0, 0x0) r12 = syz_open_dev$mouse(&(0x7f00000003c0)='/dev/input/mouse#\x00', 0x80, 0x80000) ioctl$UDMABUF_CREATE_LIST(r2, 0x40087543, &(0x7f0000000480)={0x0, 0xa, [{r3, 0x0, 0x100000000, 0x10000}, {r1, 0x0, 0xfffffffffffff000, 0x100000000}, {r4, 0x0, 0xfffffffff0000000, 0x1000}, {r5, 0x0, 0xfffffffff0008000, 0xfffffffff0000000}, {r6, 0x0, 0x0, 0xfffffffffffff000}, {r7, 0x0, 0x1000000008000, 0x1000000}, {r8, 0x0, 0x1c000}, {r9, 0x0, 0xfffffffffffff000, 0x100000000}, {r11, 0x0, 0x1000, 0x10000}, {r12, 0x0, 0x1010000, 0xfffffffff0001000}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="2900000004000000000000000000000001000000000000000000000000000000000000000000000000e51113720fdbc7b92af35514512e424ed286812d7859b42a7df0478b19b4edbcb5ad3d265318194f235319d950a62384fc063d2ca007e8c7eaf0b642da89cf4e138b99b06c"], 0x29) [ 1754.094261][T10526] Call Trace: [ 1754.097573][T10526] dump_stack+0x172/0x1f0 [ 1754.101928][T10526] should_fail.cold+0xa/0x15 [ 1754.106536][T10526] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1754.112369][T10526] ? ___might_sleep+0x163/0x280 [ 1754.117229][T10526] __should_failslab+0x121/0x190 [ 1754.122181][T10526] should_failslab+0x9/0x14 [ 1754.126677][T10526] kmem_cache_alloc_trace+0x2d1/0x760 [ 1754.132062][T10526] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1754.137984][T10526] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1754.143632][T10526] __list_lru_init+0x3cf/0x6e0 [ 1754.148388][T10526] alloc_super+0x78d/0x890 [ 1754.152793][T10526] ? test_single_super+0x10/0x10 [ 1754.157744][T10526] sget_userns+0xf1/0x560 [ 1754.162063][T10526] ? kill_litter_super+0x60/0x60 [ 1754.167012][T10526] ? test_single_super+0x10/0x10 [ 1754.171967][T10526] ? kill_litter_super+0x60/0x60 [ 1754.176923][T10526] sget+0x10c/0x150 [ 1754.180723][T10526] mount_bdev+0xff/0x3c0 [ 1754.184975][T10526] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1754.190677][T10526] jfs_do_mount+0x35/0x40 [ 1754.195083][T10526] ? jfs_get_dquots+0x20/0x20 [ 1754.199770][T10526] legacy_get_tree+0xf2/0x200 [ 1754.204672][T10526] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1754.210921][T10526] vfs_get_tree+0x123/0x450 [ 1754.215540][T10526] do_mount+0x1436/0x2c40 [ 1754.219964][T10526] ? copy_mount_string+0x40/0x40 [ 1754.224921][T10526] ? _copy_from_user+0xdd/0x150 [ 1754.229764][T10526] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1754.235991][T10526] ? copy_mount_options+0x280/0x3a0 [ 1754.241192][T10526] ksys_mount+0xdb/0x150 [ 1754.245534][T10526] __x64_sys_mount+0xbe/0x150 [ 1754.250220][T10526] do_syscall_64+0x103/0x610 [ 1754.254822][T10526] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1754.260723][T10526] RIP: 0033:0x458209 [ 1754.264624][T10526] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1754.284458][T10526] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1754.292880][T10526] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 [ 1754.300853][T10526] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1754.308839][T10526] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1754.317002][T10526] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1754.325079][T10526] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 03:52:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x84000) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f00000000c0)={0x2, 0x1, &(0x7f0000000140)=""/123, &(0x7f00000001c0)=""/118, &(0x7f0000000480)=""/195, 0x1000}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="00000001000000d04c63733e69192c0900000000000000000000000000"], 0x29) [ 1756.617796][ C1] net_ratelimit: 22 callbacks suppressed [ 1756.617802][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1756.629431][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:52:20 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:52:20 executing program 4 (fault-call:1 fault-nth:39): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:20 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x200000000000000) 03:52:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") open(&(0x7f0000000040)='./file0\x00', 0x400002, 0x2) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:20 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) r1 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x5, 0x82) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, &(0x7f0000000340)=""/124, &(0x7f0000000240)=0x7c) ioprio_get$pid(0xffffffffffffffff, r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r4 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0xf932, 0x100) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f00000002c0)={0x8, 0x0, 0x0, 0x3ff}) ioctl$DRM_IOCTL_AGP_FREE(r4, 0x40206435, &(0x7f0000000140)={0x8, r5, 0x10002, 0x2}) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:20 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000280)={0xfffffffffffffffe, 0x2000000013}) ioctl$KVM_TRANSLATE(r0, 0xc018ae85, &(0x7f0000000000)={0x100000, 0xf000, 0x9, 0x9, 0x4bd3}) [ 1756.773402][T10562] FAULT_INJECTION: forcing a failure. [ 1756.773402][T10562] name failslab, interval 1, probability 0, space 0, times 0 [ 1756.817993][T10562] CPU: 0 PID: 10562 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1756.827221][T10562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1756.837393][T10562] Call Trace: [ 1756.840700][T10562] dump_stack+0x172/0x1f0 [ 1756.845056][T10562] should_fail.cold+0xa/0x15 [ 1756.849671][T10562] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1756.855505][T10562] ? ___might_sleep+0x163/0x280 [ 1756.860373][T10562] __should_failslab+0x121/0x190 [ 1756.860390][T10562] should_failslab+0x9/0x14 [ 1756.860405][T10562] kmem_cache_alloc_trace+0x2d1/0x760 [ 1756.860422][T10562] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1756.860444][T10562] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1756.860464][T10562] __list_lru_init+0x3cf/0x6e0 [ 1756.860484][T10562] alloc_super+0x78d/0x890 [ 1756.860499][T10562] ? test_single_super+0x10/0x10 [ 1756.860514][T10562] sget_userns+0xf1/0x560 [ 1756.860525][T10562] ? kill_litter_super+0x60/0x60 [ 1756.860539][T10562] ? test_single_super+0x10/0x10 [ 1756.860559][T10562] ? kill_litter_super+0x60/0x60 [ 1756.870009][T10562] sget+0x10c/0x150 [ 1756.881328][T10562] mount_bdev+0xff/0x3c0 [ 1756.881344][T10562] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1756.881361][T10562] jfs_do_mount+0x35/0x40 [ 1756.881375][T10562] ? jfs_get_dquots+0x20/0x20 [ 1756.881391][T10562] legacy_get_tree+0xf2/0x200 [ 1756.881413][T10562] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1756.953289][T10562] vfs_get_tree+0x123/0x450 [ 1756.957821][T10562] do_mount+0x1436/0x2c40 [ 1756.962198][T10562] ? copy_mount_string+0x40/0x40 [ 1756.967150][T10562] ? _copy_from_user+0xdd/0x150 [ 1756.972020][T10562] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1756.978270][T10562] ? copy_mount_options+0x280/0x3a0 [ 1756.978290][T10562] ksys_mount+0xdb/0x150 [ 1756.978317][T10562] __x64_sys_mount+0xbe/0x150 [ 1756.978336][T10562] do_syscall_64+0x103/0x610 [ 1756.978359][T10562] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1756.978377][T10562] RIP: 0033:0x458209 03:52:20 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x20080, 0x0) pwrite64(r0, &(0x7f0000000100)="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", 0xfb, 0x0) r1 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r2 = dup(r1) sendmsg$tipc(r2, &(0x7f0000000480)={&(0x7f0000000040)=@id={0x1e, 0x3, 0x1, {0x4e24}}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000200)="dd569e2a10cd595668505e2159d8a1232ea572d1489d6cd5cc75ecd773fd82203337a53eb32a2d0bab102025a475e057e5d9a987511b3dc79a5695affcd22b", 0x3f}, {&(0x7f0000000240)="00fbd4b27adac68318198099e9c1773f010ea854003e97cddab0f6f32dbcbdd7ca83751057f65f7b0389cfa9cdc6bbfdcca6c31a04d38d14777ba6998dad391d4f8a76deb3721d66db6c94a1820be749a9b35789a7c083d4c4d407ff9c00e82879", 0x61}, {&(0x7f00000002c0)="5b12892225b96d2747ed3a00ea63f7c36421e1a10fd6972481f17d51585b352edb0cde0bc687953e452ae07747c2c1942252636f7d39fde23caa519384d6612a27980e47c04a4b7c99511895eb7e2df0dc3037a32baa85ce2d77fb17d86d0a54e3dfb51cab0d8f3ee5a30dcb524a6af37f2c9d", 0x73}], 0x3, &(0x7f0000000380)="d1d56fdb0603d9ba39efd319227f84cda27c89785fc0ad111252b053b3affe3a5b25099cb1b96ece06fb8059d5a5cbcf988422b2a6eac88d9db134c7098058b6a30a30647dbcb3b97d722ed0d6e48e4a0259b90e315a6ff01fbecda92624bbb9861dd7b091c860c7186829607d12f5aee0cc291d8452011ffd2b42d8a19d86423bcb81b67d7d1a7871d3d11c33c5f77a3c3bc68a863c69941e6b1d5d718fd95c42f21883f4e19a453e409fe251e98452095cdf9120300eb065e0861e5eb912c00b8ae4311d4a03583e367a91d76049b64eb8044684e65685e3", 0xd9, 0x80}, 0x20000040) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f0000000080)={0xfffffffffffffffe, 0x20}) 03:52:20 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x300000000000000) [ 1757.006841][T10562] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1757.026640][T10562] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1757.026655][T10562] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 [ 1757.026663][T10562] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 03:52:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x800, 0x0) ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000180)={0x7fffffff, 0x7, 0x6, 0x5, 0x1000, 0x5}) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) 03:52:20 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000280)={0xfffffffffffffffe, 0x2000000013}) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000740)='/dev/cachefiles\x00', 0x2000, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000000)={0x8c, 0x0, 0x100, 0x10000, 0x6, 0x4, 0x8}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') ioctl$IMGETVERSION(r1, 0x80044942, &(0x7f0000000780)) sendmsg$TIPC_NL_MON_SET(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, r2, 0x800, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40000}, 0x810) sendmsg$tipc(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000200)="f62c0ec7da2aed8b1d7f27b499d7f1c5f0ba1e1f2cfd43c0b78c266e79b06b9ef7e4bbeba8f8f89e5409b279eb14ca9861fb5e832909ad15509ba5b44a11cdb459cc901ddfb795fde1aba6ec64d8feedf9ca4db34217722ddad1a18cfffeba4f55ac6749534ea02cc0e7a8cae0f69ae70fe386ba5324e8c3f8670e694e1f0cc6", 0x80}, {&(0x7f00000002c0)="2f01d2e33e64de664bff5beb879d6264c6c41fbcf41f91c415178dd719ba56907e49c5745830b7110ae0cbecd1102ee76f0ca0531c3e7381dec8c6ce7e91ce2488023ed589d5032570ad05da8141", 0x4e}, {&(0x7f0000000340)="76a8e52dca9a3bee1612916c8d2604", 0xf}, {&(0x7f0000000380)="a13ed9af093e41f86c6123427afa08569aebb1618121ecce7e1d8dc8852456a37bb46ac7e71f778439d726c1fba64cfcdc9376e60cc465cd9efb464870c1295d61c07d6b45a3e1a7814182862ebd4461072af8c3f9d138b9bef1bd1cb4e5a000b93fddb063be1d74714ac64f7b71ea09d41a4fe2caa317a7b1a08a7f0d897fc3cdf0abf4491360d01bed144d26a4841ad82669297cc635fd530c76e83fc9ad6ba8dda592ac4ca9ed015db0a054578ce164036f728ecc2b85794941b0236f51a850da3f22e9034c", 0xc7}, {&(0x7f0000000480)="79040cde364e0cf83e863df41aa5b516e9a33a1e1dcfae5633e45d7f09eed3fb349d4e05edef4a59bbf126737d29dcb550ca1091ebf47fb4304a8f7662c04faeff29331fcdcb7382eeba683c1dcb4951fd15b5ca3590a98f3f9f4e18b8c635a2bc469c4cfec8a011d086910e44dc1bbee5f752017fae742c64717cf2b87e52c4251f79c9886134381083bd6bf6204b3eefda12fce0d052bb9a075d17fca297873d864c4ec4a4b11258f62c689e1f", 0xae}, {&(0x7f0000000540)="d516559bd795f1997796637b096da15aa99f3987c384847cd163c3c3cb6f12d1d038cf9d7db82d301ba368db0096b407d56b68d25b80f8784a47f75d76a25a2941be340f21de45af165ff3a52a7273148f636586c4d52aabe0afe90106e0745be14d602cd67acce0e7511deab58cc5fa705e8e420592a6", 0x77}], 0x6, &(0x7f0000000640)="9e15b5effe82cd50d7d02dae37213c25cf69b07a18b490d4b0a8e89e45f460a60439d90a048fa77de44224a33affc449080a9c5a7fe584c26a88ade802c17e17df8744c770e1cf9e8bd3527514f5f73e131f5d5d518107c9aa64db3ec7a060920549eadfea2acb80902aa00de819c1fe6462826e806ad51a527abb031d1c284ae67ac0244fc2aaa3f240591cda3f16a3ecd7f71a29737c6351776b0bd8a53bfc311a04b3eacb6bc897e984", 0xab, 0x4}, 0xbd4c6e44e617a714) 03:52:20 executing program 4 (fault-call:1 fault-nth:40): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1757.026671][T10562] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1757.026680][T10562] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1757.026688][T10562] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 03:52:20 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x400000000000000) [ 1757.266117][T10591] FAULT_INJECTION: forcing a failure. [ 1757.266117][T10591] name failslab, interval 1, probability 0, space 0, times 0 [ 1757.297991][T10591] CPU: 0 PID: 10591 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1757.307140][T10591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1757.317196][T10591] Call Trace: [ 1757.320494][T10591] dump_stack+0x172/0x1f0 [ 1757.324880][T10591] should_fail.cold+0xa/0x15 [ 1757.329483][T10591] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1757.335313][T10591] ? ___might_sleep+0x163/0x280 [ 1757.340178][T10591] __should_failslab+0x121/0x190 [ 1757.345130][T10591] should_failslab+0x9/0x14 [ 1757.349651][T10591] kmem_cache_alloc_trace+0x2d1/0x760 [ 1757.355038][T10591] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1757.360871][T10591] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1757.366519][T10591] __list_lru_init+0x3cf/0x6e0 [ 1757.371302][T10591] alloc_super+0x78d/0x890 [ 1757.375726][T10591] ? test_single_super+0x10/0x10 [ 1757.380695][T10591] sget_userns+0xf1/0x560 [ 1757.385029][T10591] ? kill_litter_super+0x60/0x60 [ 1757.390010][T10591] ? test_single_super+0x10/0x10 [ 1757.395312][T10591] ? kill_litter_super+0x60/0x60 [ 1757.400261][T10591] sget+0x10c/0x150 [ 1757.404085][T10591] mount_bdev+0xff/0x3c0 [ 1757.408347][T10591] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1757.413477][T10591] jfs_do_mount+0x35/0x40 [ 1757.417827][T10591] ? jfs_get_dquots+0x20/0x20 [ 1757.417833][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1757.417888][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1757.422526][T10591] legacy_get_tree+0xf2/0x200 [ 1757.422544][T10591] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1757.422560][T10591] vfs_get_tree+0x123/0x450 [ 1757.422584][T10591] do_mount+0x1436/0x2c40 [ 1757.422604][T10591] ? copy_mount_string+0x40/0x40 [ 1757.422625][T10591] ? _copy_from_user+0xdd/0x150 [ 1757.464190][T10591] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1757.470448][T10591] ? copy_mount_options+0x280/0x3a0 [ 1757.475655][T10591] ksys_mount+0xdb/0x150 [ 1757.479910][T10591] __x64_sys_mount+0xbe/0x150 [ 1757.484616][T10591] do_syscall_64+0x103/0x610 [ 1757.489224][T10591] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1757.495133][T10591] RIP: 0033:0x458209 [ 1757.499034][T10591] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1757.518745][T10591] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1757.527269][T10591] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 [ 1757.535268][T10591] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1757.543434][T10591] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1757.551416][T10591] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1757.559410][T10591] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 [ 1757.574355][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1757.580331][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1757.586250][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1757.592081][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1757.598144][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1757.604876][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:52:23 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:52:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0xa2) write(r0, &(0x7f0000000140)="7c0b66130d3aa0d0c584facb6fed467483fa8d826d320abfd40061f58b1dc6cecf1d0e48fd1f57a1cf284e6680cd2fafef46dc2fa5ce49bbfa9f182e3e1243394e62618ebf3bbfb17c49df8206cb8a60d464b7adc17dcbf7b490c98e3f1bafe98761f688eceff6eef72f50db25fd796749dacf0e3c6ace60b39d50549a9ca7ce6367f440d870ba5eaeba9c75c2c0ab37100b1e8094ef9864bf00e702bc9cbb4780e764801bebf22f43f5a717b9f00bacd605c306010bd212035c9be2e82d94f7e565d422576a49567cc3fb6a4b23de7529a272326308a05be16c47fb8072c5", 0xdf) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x29) 03:52:23 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x1e00000000000000) 03:52:23 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000280)={0xfffffffffffffffe, 0x2000000013}) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000000)={0x6, 0x30e8, [{0x1000, 0x0, 0x8001}, {0x2, 0x0, 0x9}, {0xfc000000000, 0x0, 0x20}, {0xff, 0x0, 0x6}, {0xc245, 0x0, 0xf3b}, {0x3f, 0x0, 0x5}]}) 03:52:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x20000, 0x0) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) 03:52:23 executing program 4 (fault-call:1 fault-nth:41): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1759.853130][T10610] FAULT_INJECTION: forcing a failure. [ 1759.853130][T10610] name failslab, interval 1, probability 0, space 0, times 0 [ 1759.878208][T10610] CPU: 0 PID: 10610 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1759.887986][T10610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1759.898152][T10610] Call Trace: [ 1759.898183][T10610] dump_stack+0x172/0x1f0 [ 1759.898208][T10610] should_fail.cold+0xa/0x15 [ 1759.898228][T10610] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1759.898250][T10610] ? ___might_sleep+0x163/0x280 [ 1759.898271][T10610] __should_failslab+0x121/0x190 [ 1759.898289][T10610] should_failslab+0x9/0x14 [ 1759.898318][T10610] kmem_cache_alloc_trace+0x2d1/0x760 [ 1759.910608][T10610] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1759.910638][T10610] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1759.930772][T10610] __list_lru_init+0x3cf/0x6e0 [ 1759.930794][T10610] alloc_super+0x78d/0x890 [ 1759.930810][T10610] ? test_single_super+0x10/0x10 [ 1759.930826][T10610] sget_userns+0xf1/0x560 [ 1759.930839][T10610] ? kill_litter_super+0x60/0x60 [ 1759.930855][T10610] ? test_single_super+0x10/0x10 [ 1759.930873][T10610] ? kill_litter_super+0x60/0x60 [ 1759.956868][T10610] sget+0x10c/0x150 [ 1759.985240][T10610] mount_bdev+0xff/0x3c0 [ 1759.989489][T10610] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1759.994616][T10610] jfs_do_mount+0x35/0x40 [ 1759.998952][T10610] ? jfs_get_dquots+0x20/0x20 [ 1759.998969][T10610] legacy_get_tree+0xf2/0x200 [ 1759.998984][T10610] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1759.999000][T10610] vfs_get_tree+0x123/0x450 [ 1759.999015][T10610] do_mount+0x1436/0x2c40 [ 1759.999035][T10610] ? copy_mount_string+0x40/0x40 [ 1759.999051][T10610] ? _copy_from_user+0xdd/0x150 [ 1759.999069][T10610] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1759.999082][T10610] ? copy_mount_options+0x280/0x3a0 [ 1759.999098][T10610] ksys_mount+0xdb/0x150 [ 1759.999116][T10610] __x64_sys_mount+0xbe/0x150 03:52:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000140)={{0x3a, @rand_addr=0x7, 0x4e23, 0x3, 'rr\x00', 0x18, 0x100000001, 0x72}, {@rand_addr=0x1, 0x4e24, 0x2004, 0x6, 0x20, 0x5e06}}, 0x44) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:23 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000280)={0xfffffffffffffffe, 0x2000000013}) r2 = getpgrp(0xffffffffffffffff) r3 = syz_open_procfs(r2, &(0x7f0000000000)='numa_maps\x00') r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r4, 0x110, 0x70bd2d, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) [ 1760.053689][T10610] do_syscall_64+0x103/0x610 [ 1760.058303][T10610] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1760.064199][T10610] RIP: 0033:0x458209 [ 1760.068105][T10610] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1760.068113][T10610] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 03:52:23 executing program 4 (fault-call:1 fault-nth:42): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:23 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$cont(0x20, r0, 0x0, 0x0) 03:52:23 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x1f00000000000000) [ 1760.068127][T10610] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 [ 1760.068136][T10610] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1760.068144][T10610] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1760.068152][T10610] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1760.068160][T10610] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 03:52:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT=r2], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r3 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x80000001, 0xa4000) ioctl$VIDIOC_DBG_G_CHIP_INFO(r3, 0xc0c85666, &(0x7f0000000580)={{0x4, @addr=0x9}, "7628ff8fb8b11ea2a947a0b9b453eeb8864591f784067114f4b2951baa54d70a"}) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) pread64(0xffffffffffffffff, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x8000, 0x108) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) ioctl$VIDIOC_SUBDEV_S_FMT(0xffffffffffffffff, 0xc0585605, &(0x7f00000003c0)={0x1, 0x0, {0xffff, 0x200, 0x3033, 0x0, 0xb, 0x7}}) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) ioctl$KVM_CREATE_PIT2(r4, 0x4040ae77, &(0x7f0000000500)) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000040)) r5 = dup2(r2, r4) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r5, 0x6, 0x15, &(0x7f0000000000)=0x200, 0x4) setsockopt$nfc_llcp_NFC_LLCP_RW(r5, 0x118, 0x0, &(0x7f0000000180)=0xfffffffffffffffe, 0x4) setsockopt$IP_VS_SO_SET_EDIT(r5, 0x0, 0x483, &(0x7f0000000140)={0x0, @multicast1, 0x4e24, 0x1, 'fo\x00', 0x12, 0x1, 0x47}, 0x2c) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:24 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000280)={0xfffffffffffffffe, 0x2000000013}) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000000)) [ 1760.277152][T10632] FAULT_INJECTION: forcing a failure. [ 1760.277152][T10632] name failslab, interval 1, probability 0, space 0, times 0 [ 1760.297186][T10636] IPVS: set_ctl: invalid protocol: 58 0.0.0.7:20003 [ 1760.317894][T10632] CPU: 0 PID: 10632 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1760.327034][T10632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1760.337100][T10632] Call Trace: [ 1760.340418][T10632] dump_stack+0x172/0x1f0 [ 1760.344777][T10632] should_fail.cold+0xa/0x15 [ 1760.349401][T10632] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1760.349425][T10632] ? ___might_sleep+0x163/0x280 [ 1760.349458][T10632] __should_failslab+0x121/0x190 [ 1760.349477][T10632] should_failslab+0x9/0x14 [ 1760.349495][T10632] kmem_cache_alloc_trace+0x2d1/0x760 [ 1760.349515][T10632] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1760.349541][T10632] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1760.349566][T10632] __list_lru_init+0x3cf/0x6e0 [ 1760.360499][T10632] alloc_super+0x78d/0x890 [ 1760.360516][T10632] ? test_single_super+0x10/0x10 [ 1760.360529][T10632] sget_userns+0xf1/0x560 [ 1760.360541][T10632] ? kill_litter_super+0x60/0x60 [ 1760.360556][T10632] ? test_single_super+0x10/0x10 [ 1760.360566][T10632] ? kill_litter_super+0x60/0x60 [ 1760.360586][T10632] sget+0x10c/0x150 [ 1760.360604][T10632] mount_bdev+0xff/0x3c0 [ 1760.360620][T10632] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1760.360642][T10632] jfs_do_mount+0x35/0x40 [ 1760.370200][T10632] ? jfs_get_dquots+0x20/0x20 [ 1760.370220][T10632] legacy_get_tree+0xf2/0x200 [ 1760.370244][T10632] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1760.387132][T10632] vfs_get_tree+0x123/0x450 [ 1760.457935][T10632] do_mount+0x1436/0x2c40 [ 1760.462283][T10632] ? copy_mount_string+0x40/0x40 [ 1760.467342][T10632] ? _copy_from_user+0xdd/0x150 [ 1760.472218][T10632] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1760.478927][T10632] ? copy_mount_options+0x280/0x3a0 [ 1760.484145][T10632] ksys_mount+0xdb/0x150 [ 1760.488485][T10632] __x64_sys_mount+0xbe/0x150 [ 1760.493192][T10632] do_syscall_64+0x103/0x610 [ 1760.497893][T10632] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1760.504000][T10632] RIP: 0033:0x458209 [ 1760.507928][T10632] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:52:24 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x3f00000000000000) [ 1760.527549][T10632] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1760.527565][T10632] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 [ 1760.527579][T10632] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1760.527586][T10632] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1760.527594][T10632] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1760.527600][T10632] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 03:52:24 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) bind$netrom(r1, &(0x7f0000000000)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x1}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @null, @default]}, 0x48) openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x40, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) [ 1760.570451][T10636] IPVS: set_ctl: invalid protocol: 58 0.0.0.7:20003 03:52:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) r2 = syz_open_dev$cec(&(0x7f00000002c0)='/dev/cec#\x00', 0x3, 0x2) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vga_arbiter\x00', 0x80, 0x0) linkat(r2, &(0x7f0000000580)='./file0\x00', r3, &(0x7f0000000600)='./file0\x00', 0x1400) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@audit='audit'}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@appraise='appraise'}]}}) ioctl(r2, 0x1000018911, &(0x7f00000001c0)="1adc1f123c120d388cecfcaf88daf0a216ecf929dfa3b91ba1c38a9a1d97261b95dc77e52693fdcefb309cc7850600000000000000bcbf40fea6a1f5dbdc415a13af7cb3ee5664ca629c64d59d792a9e53ff7ade5da929881d30726df3bd505d223bcaf5f07a5c8c479065f42560154a55fd37b7cfe95383a3259809788828e910f082c59fd0dcd62912c1470e5c5a18531f6e754113a71dafc1cc35f3385d626241e087401b") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000640)={{{@in6, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@empty}}, &(0x7f0000000180)=0xe8) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x3002001, &(0x7f0000000340)={'trans=unix,', {[{@nodevmap='nodevmap'}, {@cache_loose='cache=loose'}, {@version_9p2000='version=9p2000'}], [{@euid_eq={'euid', 0x3d, r4}}, {@permit_directio='permit_directio'}, {@subj_user={'subj_user'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@obj_role={'obj_role', 0x3d, '/dev/fuse\x00'}}]}}) r5 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_int(r5, 0x29, 0x50, 0x0, &(0x7f0000000080)=0xbd) ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) 03:52:24 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x670c000000000000) 03:52:24 executing program 4 (fault-call:1 fault-nth:43): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:24 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000280)={0xfffffffffffffffe, 0x2000000013}) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f00000001c0)={0xfffffffffffffff8, 0x93ad, 0x5}) getgroups(0xa, &(0x7f0000000100)=[0x0, 0xffffffffffffffff, 0xee01, 0xee00, 0xee01, 0xee01, 0x0, 0x0, 0xffffffffffffffff, 0xee01]) write$FUSE_ATTR(r1, &(0x7f0000000140)={0x78, 0x0, 0x3, {0x3, 0xac, 0x0, {0x4, 0x7f, 0x80, 0x61bf0726, 0x8, 0x3, 0xfff, 0xcf35, 0x64, 0x1, 0xd, r2, r3, 0xfffffffffffffff8, 0x8}}}, 0x78) 03:52:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x5, 0x200000) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000180)={0xa, 0x4}, 0xc) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000luser_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="290000000400000000000000a3a500050000004400000054a73879ec4216a500000100ea91cf183438ef2121020000"], 0xfffffffffffffd2f) 03:52:24 executing program 5: syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) ioctl$sock_ax25_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000000)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x5, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x2201) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000280)={0xfffffffffffffffe, 0x80000001}) [ 1760.877599][T10672] FAULT_INJECTION: forcing a failure. [ 1760.877599][T10672] name failslab, interval 1, probability 0, space 0, times 0 [ 1760.890523][T10672] CPU: 1 PID: 10672 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1760.899734][T10672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1760.909819][T10672] Call Trace: [ 1760.913121][T10672] dump_stack+0x172/0x1f0 [ 1760.917461][T10672] should_fail.cold+0xa/0x15 [ 1760.922044][T10672] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1760.927880][T10672] ? ___might_sleep+0x163/0x280 [ 1760.932776][T10672] __should_failslab+0x121/0x190 [ 1760.937731][T10672] should_failslab+0x9/0x14 [ 1760.942227][T10672] kmem_cache_alloc_trace+0x2d1/0x760 [ 1760.948111][T10672] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1760.953923][T10672] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1760.959572][T10672] __list_lru_init+0x3cf/0x6e0 [ 1760.964525][T10672] alloc_super+0x78d/0x890 [ 1760.968963][T10672] ? test_single_super+0x10/0x10 [ 1760.973906][T10672] sget_userns+0xf1/0x560 [ 1760.978255][T10672] ? kill_litter_super+0x60/0x60 [ 1760.983204][T10672] ? test_single_super+0x10/0x10 [ 1760.988146][T10672] ? kill_litter_super+0x60/0x60 [ 1760.993086][T10672] sget+0x10c/0x150 [ 1760.996908][T10672] mount_bdev+0xff/0x3c0 [ 1761.001190][T10672] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1761.006321][T10672] jfs_do_mount+0x35/0x40 [ 1761.010659][T10672] ? jfs_get_dquots+0x20/0x20 [ 1761.015348][T10672] legacy_get_tree+0xf2/0x200 [ 1761.020017][T10672] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1761.027473][T10672] vfs_get_tree+0x123/0x450 [ 1761.032013][T10672] do_mount+0x1436/0x2c40 [ 1761.036347][T10672] ? copy_mount_string+0x40/0x40 [ 1761.041367][T10672] ? _copy_from_user+0xdd/0x150 [ 1761.046217][T10672] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1761.052549][T10672] ? copy_mount_options+0x280/0x3a0 [ 1761.057834][T10672] ksys_mount+0xdb/0x150 [ 1761.062082][T10672] __x64_sys_mount+0xbe/0x150 [ 1761.066759][T10672] do_syscall_64+0x103/0x610 [ 1761.071354][T10672] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1761.077281][T10672] RIP: 0033:0x458209 [ 1761.081194][T10672] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1761.100790][T10672] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1761.109241][T10672] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 [ 1761.117214][T10672] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1761.125172][T10672] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1761.133258][T10672] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1761.141225][T10672] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 [ 1761.737859][ C0] net_ratelimit: 18 callbacks suppressed [ 1761.737868][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1761.749426][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1761.755228][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1761.761006][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1761.766787][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1761.772583][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1761.778438][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1761.784179][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1762.857848][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1762.863687][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:52:26 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$cont(0x20, r0, 0x0, 0x0) 03:52:26 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x8000000000000000) 03:52:26 executing program 4 (fault-call:1 fault-nth:44): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:26 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000940)='/dev/vsock\x00', 0xc0000, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000480)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@empty}}, &(0x7f00000005c0)=0xe8) sendmsg$nl_xfrm(r1, &(0x7f0000000840)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000402}, 0xc, &(0x7f0000000800)={&(0x7f0000000600)=@polexpire={0x1cc, 0x1b, 0x10, 0x70bd26, 0x25dfdbfe, {{{@in6=@rand_addr="d3d78b42fa6158a62a1d0d0b81900a96", @in=@rand_addr=0x802000000000000, 0x4e23, 0x5, 0x4e24, 0x3, 0xa, 0x80, 0xa0, 0x3e, r2, r3}, {0x9, 0xde0b, 0xcc4, 0x7, 0x401, 0x7d, 0x20, 0xfff}, {0x7, 0xfffffffffffffffb, 0x7, 0x1}, 0x2, 0x0, 0x0, 0x1, 0x2}, 0x3}, [@sa={0xe4, 0x6, {{@in=@multicast2, @in=@multicast2, 0x4, 0x0, 0x4e20, 0xffffffff, 0xa, 0x80, 0xa0, 0x7f, r4, r5}, {@in=@rand_addr=0x1ff, 0x4d3, 0x6c}, @in=@empty, {0x800, 0x5, 0x3, 0x35, 0x5, 0xb2, 0x3}, {0x0, 0xbc00, 0xcc3, 0x9}, {0x7fffffff, 0x2, 0x1}, 0x70bd2b, 0x3507, 0xa, 0x3, 0x0, 0x1c}}, @encap={0x1c, 0x4, {0xffffffffffffffff, 0x4e22, 0x4e23, @in6=@remote}}, @mark={0xc, 0x15, {0x35075d, 0x3}}]}, 0x1cc}, 0x1, 0x0, 0x0, 0x880}, 0x4004) r6 = dup(r0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r6, 0x84, 0x65, &(0x7f0000000000)=[@in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e23, @remote}, @in6={0xa, 0x4e23, 0x5, @loopback, 0x1}, @in6={0xa, 0x4e20, 0x7, @empty, 0xfffffffffffffffb}, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e24, @rand_addr=0x3e9}], 0x98) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r6, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x200, 0x6, [0x80000000, 0x7, 0xfff, 0xff, 0xfffffffffffffffa, 0x1000]}, &(0x7f0000000300)=0x14) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000880)={r7, @in={{0x2, 0x4e22, @multicast1}}, 0x20, 0xc190}, &(0x7f0000000340)=0x90) ioctl$KVM_GET_ONE_REG(r6, 0x4010aeab, &(0x7f0000000280)={0xfffffffffffffffe, 0x2000000013}) 03:52:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair(0x0, 0x80000, 0x7f, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000140)={r0, 0x1, 0x80000001, "b971c68a778a4597eeb69931f45934a723cc326b08c52a9075ba4714cb63617ddcbffb09993a8944ae4b67acd57f0e49fe1e0ad668f5e3d7a188580600fb9f38e16cb4b688dd1f5f86d6a988fe75ea66b2abaf62a25531217638f081cd155b4c4308e66d77cc2ff41ff164f1895ee9e5348a9c127e1931cd248bc3b4c7354456353b56ddb22ff89226116321dd1284c5a0d7c16ef7dfeec84db73313fdd1f2c878ce2dc5c58e0f2203a0eb9cc054ada8471b3ef884264682c0"}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xc) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='wd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) write(r1, &(0x7f0000000480)="b85d97db21751b3fbaf7bbfeb1b7014f6d34db2c95f1a9562ac9baf4a113c542e8a6368dc004a655807a99830f7b1db49b28b96ac645ad269f608d0a3fd299c122543ebb29296db320bb5b5b18d4a29556be3637d3cd1886c28cb9c852ec6da4009bfd1e23d7991a4550412c249b3a31319b1f5b33e9cbdd18f8b54c34244973ae27118938429f945f4bbc2b59dd15862f4db9617f5d8d11ad49686d388948b836ce6df7dddae615fb49d670cb25694688afc3c1eec7f95ff57efae7e488597b73732f31f2266205e1ba66f2684c86f76486635a9bd1685b0516b304ba415abd4d936fbea31b69ba538ce2e5d9fc056fe3f66477d1460a08421593e56b7856bce75a0dc0a1de03683721f3cfc3b08772363ba35d3b8c54f50e6878c2d9f9cb3cba7f81a06d49c4f7503a23088a3bbf630c9f96d9607e9bd77a0045093ef43b2e9893b7ed52da546beefbdfc092518ec4e410a7e8aa5351ad11c3c0c8e4225bb795870cf664e8071bec649e22d5dda6820b7d46ca52dd900ae0d0c7cb71bc89f0ca6290798fdb0c980f83017a77c49904bbc3f274eab51e5e8f69e5f6b59e8c61eedb223970c85cab1c84b15e510f2ad1103ccf689616bc53cab2d1b48f2aab3fef10ad38ac5479a50f57214f1906fe926bf541448d3f696aec4e3232225c6c775b560fc1438006f2f81795cd368765e680025ba503fa51a410313f12dd6b2316d304d376fc96e7e1c9b10d73d334c60ef0fb58dfb26a57d195fde781dee6b4275dd2fcf80ae3d46f3307ed9f085cba8287244f2c6ea29a74d34f44420bf357f0091e1bb04ebafad73a326fa69b0025fbcda74da462a9a1a49fdc45648b055f46217becc95ec6930ca4ccc1717fe671c8eb70b3a1e80e3f31e4a7593f369b1f8f28410b06cef93311857a53d7468f71241883cd57be3c01abf89c8e404d1085bc59fa7e1c9d58683e19ebc4fdcb5733e21f2513f506884e1e38d64d034abeb32b6d0e5bf340303001a30bdff54fca5bddda0f6ce0217731919dc4a45673627aadb97c7e79862cd3c9b5a87a8b1038e39bc415b88e1fd092b43b6085cd567f409bb4eef93980e9104cede7a10a3846b2abc596c5c13df5f6dd60c399f1fb2daf3982202d4b06156f388cfcf050ce64de19adc12c97c9723fd986e70ba7e0621a0716f7e3f247d75dee00b6351e3e10623ae76d96ecf758c23deccd18db1ff2bc0d56da67ef836512d9c692ab081512779582c5d92756b2bba2751d8e9b6a4b232b486c1121eaac058f6c08b0e37bf5fe2c2fbe1b6c846ad1ad12cb8392cb82be09b8d070203113a8efa6d75d2192dbd56acd00e32970ef067a02dab3a91f270ec9692c1b77dd0da43a83d6f823e0f141bfa9b3d8aed0d13b11d26bd651b1d8ba25406b88fbbc2e0f41159e3f1b1a0c673570abf1692fa58b63329a9e2f2a9c99d177e64e29577c7cae38edbfd6dd815050d88356904f3c3ddafebf9b3134e485a2bc73ce7216b79b05348213b2f7f9bf1a2ec364bb8a707f5b87bf2e12ac3bdb3970bd827017cf6537f11bb4422f45489a0a719ce6ed987c6e1f3fc8128a6126363fbae49383de3a8ceefa40ec0fe500ad08aeba1a59da37a8d6ad1489efca39d5687ebde30b2a22efa962bd97f725cdaa5097997fc38520d8dfb04abbd6d3e5074a4a6f69267f410be081711f92f17e8bb10575d3cad3b847cceb3ce827f122f7e5baca41ef03fcaa47c34b338f91effa3a1dce04851c3f88e1dd162ebe00806901b5b9a7a703e2c08b25421de022fcd3a90dc24738bdda08dda4de8c2ca0c9c02fefc88fc198e4a54ef6986a875e7eb9f68adc55b2a59bb48585f10a9591adbd5e347697c07f3de1e5ddb5eafb90c160b22853f0e9484938cad9d8861572a77897ac3cebe75e393504014b3e4a8fd6a04f294ca240a984a19876e90bc16fe1fd8903aa1dd0fde56a55c14900593c0deccc057c22897abc9a5087eb3c1abe1e83cd36f9c12fc912c4a4c6fde3eecde3e796941587564a04a8d6b50a9dfa112de3a2338ae1562174218f14ce89cb390ecd75e13766c2e9bd2ed8f85c91114ffed56618f5f838ddac7eda77f452fa9f87a4bdbee120f4aba671c8d65eb67eb2bd38674b3eb9b08bacab9092c19124bd2cb0281d213e1179b0f48c0eb70e9f9e2cb4a4192ef45be0ad81e03ac67168020b96c11318387fc712e67f029fb8919527e8e51102ba6356e01f8b7da8d2fbd651567137e24768fb910f4cbc2e67c2b6b501cc3a240f1ff9895fd609f5f3937ca8172488166b9173c26bcfa33175dbe3614e879e52a31ebc58bc8e574dc68d12c0ba81df93f9590dd8e429f0f37ee4dfdfca5f9b7792da247ff01c6339e336d9d94d4632f18431af259a83d3d9aa1eca0753a419042d57bb82f5c38bf73ae343ac37543f1a777ad38f9360572658ebf26f4d875a74ba45fc75ab2819e56c7612fc078320334ed37085832cef01e41c3474ef237aa2ed4b169a4fd4856d56dc4b5d0dcf00cb023fd1648b5cdb4d98650ac577fa978648be52849076fd2e4aff1e29ddba1aecf8c71328796c1d23ed628af9f1508b54083c7b7259aacb352f4981906205b41687d7a2dfc1fca1ac67d27c3f520b2ade8a4a4bbc1c358fda0f89bf8a5f0f8e825dcdf9026703b59521945c3dd806ed17d70375181162670db8d3599c57d963f30548ba71dd428061e2573ad01eeef877537997efbec1dedbef0ea64091f3b38c61da235c4acaf5e94e55dd5270fa831dd9e36be4299bce12243af56a567df0bc45d7db5c1a6cac97b9aac540353bff5cea755f3de455aa588095f8df3c52047dfd340196c5331455ff2a9595ca3d7de16318e5352a4929d2f0b1ff1b0b843902f8384fbe7005df226768092e004159e12123b3f2f3a02a6419d273d73a5831fe48327b805d89d38f3f99fdf38ff6b01325d5749203f1616f1e8cea2fb6b032ac48b3e2ec3a2f0982b4e206b9f7ad436dc613834d7053be33d124fe2c676f2d69f003fb3f482bed9e79adb6742f783d83dd3e7a7ae2a2ca26fd239ff3feeb1f26969f165c9813011f9f4efb418269db1d565b28d9fc5beb525db8a9914156d03fdf4f0aa73b7af0459da6c4a80ccc17c3ab5a64823353bfe87dcbfef477f910efae4ca5d6b4cccd44ed079b44f1f4d093da023097eb71b97324cc6a7fc115cef9b5f84e4367d548283d5f74c33fd7c9975721b4f2b3296df78bd903e2dbfc2f0213123d80b8fe23d4f1bab953c025896759b4ba4582fcfd1906aa1541833f5bd05bf5b246534bc6834f0b42c15f95cdec4445a727a9766f3f0551950576b029fee6965bf7bef2f3458b5201da52315220f75e4d32c0c09c5f5eff401488f77846ac97770faa4ba15698dbea7527fff6762743878cb64659379d97d7942f4a65364bf166f4e7ffc5b789881d90448a3f276211126f066349306921de5d47367f63f5f93bead69d085324daf8fb9c6c345a8a2a0b27dccb55ffcf5d3023b89b4e7590a55ccb86e9e9e07cd908d6fb6510e7f22465b6381bda861747a4f21d55e8d5db94730dda6bd39bcb5f9c896dba8c22724ce70c0546b03837e39f06b6f2632b717b7efebda813bc4d682c74dc5e1a08e57ef6661c8710470ee6250fd1b0e1ce3e3410d4b12e93b6c4cbeb4b7c829b4646bb33979cfda3471948ea7e136312cb2146db6d5abdcc6f6a9be66042f4928d17cccb8540e7c5e3f78b6e0d5f8c334b58471dbe379fe304c8672e4056e2d99a695f8a6bafd4afba280bb224ce59fd3fa8a3c3e4168ad598d19b8b678adf5d8b0cbf8369e5496fe34474b7d441763688da45fe4c9e0fe5fd1370dbd50b8aa445767847ab3e94d0d9772307606bcad5255e866a5452ca69cead86d1609cf61e2cb30b1f3f6d5010e7041ccd07c11a8ba7870880fdca3a3b79d41389275bf8733f31046e6f69c5bd315474f0dedf3ef96c717df32387f58c4edefb8cabd2ceb60f85d5fdb1527c9090874b5da46ded4ec9548a55aa33e9cbfe4faa2a1704a144bcd06fccfc466aa2b8832e4bad604a7b503e94ff9a6de425e1a68e0b2a56ddfa6aedd6398f96c7b457496d7ec25c71f7a59f544c848464bcb69eb0df2e32e8f38dff128c9fba34b9e9afdea8b17fb2b334901ca6ddb67658ffc56acc12ba9b45418450ca6d5b85c9dbe967a00217b4de432167b6415cd88ffa36464e0a0593962ee72878be0c3b6f44fd538564cd84d050dded88f1f6dfea68b561982e5f6240fd68e512209aab020766841a00aa022c6a1d19ff073e33089a6f21ac11910042eeb999788661146ba59ab370d05edb5b68386cee440c7118e20b4d708d4a149984967da4d0eedcf55cab0f1f4447214347b4e2a1849b3b5d0d6a902159097ed540edb9418ec60d6fe345f49d476ded762051437ca7671a066d1720b7b867ed6dee9d26a004e11e1d5cc54594c21dba086ce56bd4f637a98402c076e15b21777adc2495bb680c94abca9dc4c0b0df14b632c210e73ece4eeb7db59b2924331bf8f9f0c3b443da59bd7147b0e9e075cd67678860bd242a28f53376d0c7e3f6aa41f510ededf72921bc8686a453ad9639dfef7604e6af5eef4038ab2b93db46a61f3ab0685838c5a6991274678667875da1e9a12cca29ab7044d3a2f2eba5df078d3829a083e550ad164d0e27f5ed87c8891d33b8e6169647127e1675897b5a0221d1e17f172cd8dd4b900512addb572039f70a01d1f79a58aba2e27d6fbb3a654df752d4210ed5ab2262293797e27494255c496eb70cc8028644f6ce1bf840e02ca824bfb3e66d254b5be208fe97f76159df6c914928fa6d6cfb5851f16791d3c98e42e31d2672c83a0b4e1e1a4f486f40ce677940ef52d792fa75c8dbc55123d087a18e0d2da970076fac00488a6fae6c378def5e2128003b63ff53db3fbe7037543dc1ef54ecdf803ea1f4922355ee50e14a5d72715be5d75a3765d286968ac6de0103a3a1e418d9f01654dd138df9dbaf5757450fae1ea55f7d41794103cd9f26396b9926ae744b2d3a43f4035abd4baf9fdfe2e0bedfa84c935d31fb811ef67045ac76f352058b10d29bda56002b53febf69700d0cc24600f29e410d3d981da1dd1d226ca39d5f1227fd7d19bd67cf6a1152db6042de459284d64828e3b683dff6c2f5182034a721f7679e79d49b4864141303bf57860856a8529548ab90e6f05c10613804efc9180a77963888d51b7e71e467b862d0d5a49b707824cd1db02e88a90806fcc1bbd8ef121048b3c84321cb1e367547afde1e8f64b9b077dc9d095d2ef33f3f455d00a99416f8f9c6dd1cbf11b727fe70e241b48350b39acfca747606c57e0607b0741ef816b19b4cbc89efe94171f0d0968e8b3f79102f86f2cb720b9a20696c8fed106621ef0e6a342786f690c34ea4a8c2fe0126eaad9cb35c9d8dd60b017a662ef0e70ac835600d6d742c5bd5e3923d373b667620fd1f66046718a136b4a6d5ba687905c96bdf81becda746cddce771020413a25d214b9ff90a94372c0e582b54b97ac4d0f06cd3b697dcd98b5f33b2bd9780e2f97cf56c2ae42c40dc9da3170d69562ded68e588f0f12e08fc90af92ac957933d09ed5cc6e5392f33d648532ffdb3253ecb8f279fa9d3fb5d0098305b1a70a0b5029df7068e17e04a39a930ac0268dfbb012d1bb099ba757edacac40b5519afba7ccc35520ffdd382aef387c305fcfd29823db9d32eeb7f517569902253cfabe68d46bd45d18fc16eae1f73f428fd4c9e8bf9bbd80bbd02dc220a4cf8f41eba5df60", 0x1000) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="2900000004000000000000000000000001deffffffffffffff00000000000000010000000000000000"], 0x29) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x480000, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000340)={0x0, 0x40, &(0x7f00000002c0)=[@in={0x2, 0x4e20, @broadcast}, @in={0x2, 0x4e20, @multicast2}, @in={0x2, 0x4e22, @empty}, @in={0x2, 0x4e20, @loopback}]}, &(0x7f0000000380)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f00000003c0)={r4, 0x6}, 0x8) openat(r3, &(0x7f0000000240)='./file0\x00', 0xc00, 0x80) 03:52:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mprotect(&(0x7f0000bfe000/0x400000)=nil, 0x400000, 0x9) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x2, 0x92000) accept$nfc_llcp(r2, &(0x7f0000000140), &(0x7f00000001c0)=0x60) ioctl$TCSETSF(r2, 0x5404, &(0x7f00000000c0)={0xffffffffffffffff, 0xffff, 0x41f699ac, 0x3, 0xd, 0x1, 0x0, 0x5, 0x7f, 0x8, 0x4, 0x3f}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0004000000000000000000") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) [ 1763.245461][T10697] FAULT_INJECTION: forcing a failure. [ 1763.245461][T10697] name failslab, interval 1, probability 0, space 0, times 0 03:52:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) [ 1763.325662][T10697] CPU: 1 PID: 10697 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1763.334811][T10697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1763.344964][T10697] Call Trace: [ 1763.348273][T10697] dump_stack+0x172/0x1f0 [ 1763.352636][T10697] should_fail.cold+0xa/0x15 [ 1763.357246][T10697] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1763.363121][T10697] ? ___might_sleep+0x163/0x280 [ 1763.367974][T10697] __should_failslab+0x121/0x190 [ 1763.373083][T10697] should_failslab+0x9/0x14 [ 1763.377709][T10697] kmem_cache_alloc_trace+0x2d1/0x760 [ 1763.383086][T10697] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1763.388991][T10697] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1763.394612][T10697] __list_lru_init+0x3cf/0x6e0 [ 1763.399368][T10697] alloc_super+0x78d/0x890 [ 1763.403783][T10697] ? test_single_super+0x10/0x10 [ 1763.408740][T10697] sget_userns+0xf1/0x560 [ 1763.413058][T10697] ? kill_litter_super+0x60/0x60 [ 1763.417984][T10697] ? test_single_super+0x10/0x10 [ 1763.422913][T10697] ? kill_litter_super+0x60/0x60 [ 1763.427967][T10697] sget+0x10c/0x150 [ 1763.431777][T10697] mount_bdev+0xff/0x3c0 [ 1763.436117][T10697] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1763.441223][T10697] jfs_do_mount+0x35/0x40 [ 1763.445538][T10697] ? jfs_get_dquots+0x20/0x20 [ 1763.450199][T10697] legacy_get_tree+0xf2/0x200 [ 1763.454887][T10697] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1763.461113][T10697] vfs_get_tree+0x123/0x450 [ 1763.465623][T10697] do_mount+0x1436/0x2c40 [ 1763.469942][T10697] ? copy_mount_string+0x40/0x40 [ 1763.474864][T10697] ? _copy_from_user+0xdd/0x150 [ 1763.479716][T10697] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1763.485938][T10697] ? copy_mount_options+0x280/0x3a0 [ 1763.491120][T10697] ksys_mount+0xdb/0x150 [ 1763.495346][T10697] __x64_sys_mount+0xbe/0x150 [ 1763.500009][T10697] do_syscall_64+0x103/0x610 [ 1763.504589][T10697] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1763.510464][T10697] RIP: 0033:0x458209 [ 1763.514338][T10697] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1763.533924][T10697] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1763.542338][T10697] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 [ 1763.550305][T10697] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1763.558262][T10697] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1763.566221][T10697] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 03:52:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") fgetxattr(r0, &(0x7f0000000340)=@known='com.apple.system.Security\x00', &(0x7f0000000580)=""/4096, 0x1000) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000380)) write$FUSE_NOTIFY_STORE(r1, &(0x7f00000000c0)=ANY=[], 0xffffffffffffff48) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="8db40dce0f130e95c08e5b0ecb57020a84cb70620bc02cbd7f1d19ab9dad9a425db2a5c21216df9e2b9b13d9e29e7b5e659873cdb653fa61ff8acdd40e565f6f0b38347f92ab882d75aadfbe1e6110fd004f37226bb50c8b029baaa318a1223b580ccb380ef79e16c2e96577f0e7c500f8751a9d62d8b97cb9b25aeb48b476c862987eda568840b8d7465c366317be48d10a9f9cbe3eca9370cbae5b050d338b883d77c9f022a284373d22a8c9fd929a6e22d18f3ed77a11ff0c42edfbab066537b700c067a4d0f6a8a754979484ad8fe50e2464f27276a8aef6a3243239c84aebe275b1e76bc2de5c09a7c701ace9e79348479c", 0xf4, 0x60}, {&(0x7f0000000480)="f40bc062cb5566bba1c6655458c941e09094d2a99041a07c5dc304814a42f8c6ac37294bea2d6d0a1e3a4072df5baaa04ca4c4e8f276b819ef1680c0c18379e563489b7a42f4d173580727e92a67e702f3030be63337c43844c92bd7bc4b9973714fc88445e12fa67227217fb430c54d6c792d5e6dfe5ae2879258fec3a01806970b356d1c3ad3b597c08edfe212e8080b689413c855aad902cdc4d8154d137b308a03c5bb300a41c24726adbb117c54603c318f21905335e40ccdc3152497aee11d1c148f0a52", 0xc7, 0xfffffffffffffffe}], 0x2, &(0x7f0000000280)={[{@check_int='check_int'}, {@compress='compress'}], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@dont_appraise='dont_appraise'}, {@smackfsdef={'smackfsdef', 0x3d, 'fd'}}]}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ubi_ctrl\x00', 0x113141, 0x0) write$P9_RVERSION(r2, &(0x7f0000001580)={0x15, 0x65, 0xffff, 0x9, 0x8, '9P2000.u'}, 0x15) 03:52:27 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x40000, 0x0) r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000280)={0xfffffffffffffffe, 0x2000000013}) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, &(0x7f0000000440)) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000100)={'filter\x00', 0xb3, "d926a749ec62e0a26359d5f0a7370f74a499f4837aa9bce637a95d9fd0b28f2c3fb407bbeac61206000000e5123c98a75ed4e5c63c33313555c09ad521d7521b9a5a7b22ada409f9dc22f26f0660199f22bfdb3226037ff6eb8f9ccaad1e67d2edb3c1e8ad48b83700482d0cc579f118bfc004999dcb644f156b8729caf4bd3049768ebd1b97957c81072f8260b00e092703064e88d37b4c603285044a758bf2d703dbe596dc059176d91f754c9b34f6c5eae9"}, &(0x7f0000000080)=0xfffffdab) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000380), &(0x7f00000003c0)=0x4) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000040)=0x46000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xb3c1) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000540)=ANY=[@ANYBLOB="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"]) ioctl$KVM_S390_VCPU_FAULT(r0, 0x4008ae52, &(0x7f0000000000)=0x2) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000200)={r0, 0x0, 0x852d, 0xffffffff, 0x5}) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f00000002c0)={0x8001, {{0xa, 0x4e21, 0x7, @mcast2, 0x2}}}, 0x88) 03:52:27 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x99f3ffffffffffff) 03:52:27 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1763.574176][T10697] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 03:52:27 executing program 4 (fault-call:1 fault-nth:45): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:27 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0xfcffffffffff0f00) 03:52:27 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000280)={0xfffffffffffffffe, 0x2000000013}) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000002440)=ANY=[@ANYBLOB="0a0000000000000001000000000000001b00000000000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000001000000000000002d00000000000000", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000000f0000000000000d000000000000000", @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000004100000000000000700000000000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00U\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x001\x00\x00\x00\x00\x00\x00\x00', @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000004f00100000000001a00000000000000", @ANYPTR=&(0x7f0000000300)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000000d00000000000000010000000000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000002000000000000000010000000000000", @ANYPTR=&(0x7f0000001340)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000020010000000000c100000000000000", @ANYPTR=&(0x7f0000002340)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) 03:52:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x6, 0x80000) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) [ 1763.807216][T10735] FAULT_INJECTION: forcing a failure. [ 1763.807216][T10735] name failslab, interval 1, probability 0, space 0, times 0 [ 1763.820377][T10735] CPU: 1 PID: 10735 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1763.829504][T10735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1763.839557][T10735] Call Trace: [ 1763.842866][T10735] dump_stack+0x172/0x1f0 [ 1763.847211][T10735] should_fail.cold+0xa/0x15 [ 1763.851807][T10735] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1763.857620][T10735] ? ___might_sleep+0x163/0x280 [ 1763.862483][T10735] __should_failslab+0x121/0x190 [ 1763.867599][T10735] should_failslab+0x9/0x14 [ 1763.872108][T10735] kmem_cache_alloc_trace+0x2d1/0x760 [ 1763.877484][T10735] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1763.883307][T10735] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1763.888948][T10735] __list_lru_init+0x3cf/0x6e0 [ 1763.893714][T10735] alloc_super+0x78d/0x890 [ 1763.898130][T10735] ? test_single_super+0x10/0x10 [ 1763.903069][T10735] sget_userns+0xf1/0x560 [ 1763.907399][T10735] ? kill_litter_super+0x60/0x60 [ 1763.912341][T10735] ? test_single_super+0x10/0x10 [ 1763.917273][T10735] ? kill_litter_super+0x60/0x60 [ 1763.922217][T10735] sget+0x10c/0x150 [ 1763.926033][T10735] mount_bdev+0xff/0x3c0 [ 1763.930284][T10735] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1763.935408][T10735] jfs_do_mount+0x35/0x40 [ 1763.939740][T10735] ? jfs_get_dquots+0x20/0x20 [ 1763.944417][T10735] legacy_get_tree+0xf2/0x200 [ 1763.949107][T10735] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1763.955377][T10735] vfs_get_tree+0x123/0x450 [ 1763.959887][T10735] do_mount+0x1436/0x2c40 [ 1763.964224][T10735] ? copy_mount_string+0x40/0x40 [ 1763.969165][T10735] ? _copy_from_user+0xdd/0x150 [ 1763.974017][T10735] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1763.980253][T10735] ? copy_mount_options+0x280/0x3a0 [ 1763.985458][T10735] ksys_mount+0xdb/0x150 [ 1763.989697][T10735] __x64_sys_mount+0xbe/0x150 [ 1763.994397][T10735] do_syscall_64+0x103/0x610 [ 1763.998990][T10735] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1764.004885][T10735] RIP: 0033:0x458209 [ 1764.008806][T10735] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1764.028411][T10735] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1764.036934][T10735] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 [ 1764.044922][T10735] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1764.052894][T10735] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1764.060867][T10735] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1764.068837][T10735] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 03:52:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) socket$inet_sctp(0x2, 0x1, 0x84) ioctl(r0, 0xb32e, &(0x7f00000001c0)="d746da8ab932cb16f0767cd394f4a7edf0d22fa63e995fcd73e7afd6df042f1171c225bdf4119d82b781f670cee1eaf027b0f9bf19acb6203e677b73cc4747e8556230426eb8d4") r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="26098cbce361650e88b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x28, 0x4, 0x0, {0x1, 0xfffffffffffffffd, 0xfffffffffffffe51}}, 0x28) 03:52:28 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x5) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000040)=0x400) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x600000, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x82000, 0x38) 03:52:28 executing program 4 (fault-call:1 fault-nth:46): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:28 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0xfeffffff00000000) 03:52:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000040)=0x101, 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) [ 1764.341527][T10760] FAULT_INJECTION: forcing a failure. [ 1764.341527][T10760] name failslab, interval 1, probability 0, space 0, times 0 [ 1764.379028][T10760] CPU: 0 PID: 10760 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1764.388251][T10760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1764.398392][T10760] Call Trace: [ 1764.401704][T10760] dump_stack+0x172/0x1f0 [ 1764.406053][T10760] should_fail.cold+0xa/0x15 [ 1764.410666][T10760] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1764.416492][T10760] ? ___might_sleep+0x163/0x280 [ 1764.421362][T10760] __should_failslab+0x121/0x190 [ 1764.426326][T10760] should_failslab+0x9/0x14 [ 1764.430874][T10760] kmem_cache_alloc_trace+0x2d1/0x760 [ 1764.436287][T10760] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1764.442134][T10760] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1764.447804][T10760] __list_lru_init+0x3cf/0x6e0 [ 1764.452589][T10760] alloc_super+0x78d/0x890 [ 1764.452606][T10760] ? test_single_super+0x10/0x10 [ 1764.452622][T10760] sget_userns+0xf1/0x560 [ 1764.452634][T10760] ? kill_litter_super+0x60/0x60 [ 1764.452650][T10760] ? test_single_super+0x10/0x10 [ 1764.452662][T10760] ? kill_litter_super+0x60/0x60 [ 1764.452675][T10760] sget+0x10c/0x150 [ 1764.452693][T10760] mount_bdev+0xff/0x3c0 03:52:28 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) getsockname$unix(r1, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000280)={0xfffffffffffffffe, 0x2000000013}) [ 1764.452716][T10760] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1764.462108][T10760] jfs_do_mount+0x35/0x40 [ 1764.498778][T10760] ? jfs_get_dquots+0x20/0x20 [ 1764.503487][T10760] legacy_get_tree+0xf2/0x200 [ 1764.508174][T10760] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1764.514422][T10760] vfs_get_tree+0x123/0x450 [ 1764.514440][T10760] do_mount+0x1436/0x2c40 [ 1764.514460][T10760] ? copy_mount_string+0x40/0x40 [ 1764.514476][T10760] ? _copy_from_user+0xdd/0x150 [ 1764.514493][T10760] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1764.514506][T10760] ? copy_mount_options+0x280/0x3a0 [ 1764.514525][T10760] ksys_mount+0xdb/0x150 [ 1764.514541][T10760] __x64_sys_mount+0xbe/0x150 [ 1764.514561][T10760] do_syscall_64+0x103/0x610 [ 1764.514594][T10760] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1764.565262][T10760] RIP: 0033:0x458209 [ 1764.565279][T10760] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:52:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="2900000004000000000000000000000001000000000019000000000000000000010000000000000000b1a5fd194604dfeb7244857be53e5b29a2eab212bcd5a741f8c2181afcdf5bdd76c44b2de7d3837ce7"], 0x29) [ 1764.565287][T10760] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1764.565312][T10760] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 [ 1764.565322][T10760] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1764.565331][T10760] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1764.565339][T10760] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1764.565356][T10760] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 03:52:30 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:52:30 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0xffffffffa0008000) 03:52:30 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000280)={0xfffffffffffffffe, 0x2000000013}) socket$inet6(0xa, 0x3, 0x3f) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) 03:52:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x2000, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r2, 0x4038564f, &(0x7f00000000c0)={{0x7, @addr=0x1}, 0x8, 0x7, 0xffffffffffffffc1}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2900000044000000000000000000002309ed0f852ef8b188be11834b0141d4f21b2800000000"], 0x29) 03:52:30 executing program 4 (fault-call:1 fault-nth:47): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x5, &(0x7f0000000040)='fuse\x00'}, 0x30) prctl$PR_MCE_KILL_GET(0x22) fcntl$lock(r0, 0x25, &(0x7f0000000140)={0x1, 0x0, 0x0, 0x10001, r2}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c0033092e2b788258e47ffaece48d046f76ff2444a1e96316d257ce69ea"]) r3 = syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0xffffffffffffffe0, 0x420040) ioctl$VIDIOC_S_DV_TIMINGS(r3, 0xc0845657, &(0x7f0000000340)={0x0, @bt={0x1, 0x1, 0x0, 0x3, 0x6, 0x8, 0xfffffffffffffff8, 0x0, 0x8, 0x4, 0x4, 0xff, 0x3, 0x400, 0x1, 0x9}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2900008d492f81e4309598000000000001000000000000000000000000000000010000000000000000"], 0x29) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000180)=0x7, 0x4) 03:52:30 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000001440)=0xc) stat(&(0x7f0000001480)='./file0\x00', &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x5, &(0x7f00000013c0)=[{&(0x7f0000000100)="98203661694e69b609898910be20", 0xe, 0x7ff}, {&(0x7f0000000140)="e2462cce92cdf07802194582a3a9b02985505838b50a1323e68bcf79202c198ec7cf7260ec450df7c0daccd5a7d120392a5a52b3afde69cbd631d8321fccabe8015f74", 0x43, 0x80}, {&(0x7f00000002c0)="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", 0x1000, 0x2}, {&(0x7f00000012c0)="c719729b43e1e6545822f360f678a10028c06bfa84f630656a2bdfdcc2f49bd59dc535a643dc187af078f323c5d221c7fc801214caf4e54a4c2afd4161c3bcc2c56b11bf19d662b4b71e69b7664c9b86f6aa64244e4b718d30cc0abcc5c5f56f2f3fcf5548d1ca55ef4220076cd7839d90f7ec011b0c9dcc4c52e35dc6a6656765fce8421ff10bef61056545e9e610226965b11a61d1cc30ec303619d3c1a22f0c99ec7eeffd0bfd73ecbd8ffd7af1db856a5acdb245fc4169fe97130ed4ff84d48f8abac7ae45e2ca026071912358df4df82a3182e0c3fb46b8af9dd51d9134a437546e3d7bfb55b5350ef3", 0xec, 0x6}, {&(0x7f00000001c0)="bc608b18bae75b80e64de6d1167a6713aac43218c488401081364bf80135dfb6defcee7a0ad447bfaddd105ea5f66646575c2a905ddac7f9f6b6baea165f0fa85ae87a4d3e82cedff827cc647751362e1888605d14", 0x55, 0x4}], 0x204001, &(0x7f0000001540)={[{@quota='quota'}, {@noquota='noquota'}, {@umask={'umask', 0x3d, 0x2000000000000000}}], [{@fowner_eq={'fowner', 0x3d, r0}}, {@smackfshat={'smackfshat', 0x3d, 'em0vboxnet1mime_typecgroupvmnet0trusted.'}}, {@subj_user={'subj_user', 0x3d, '&'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/dri/card#\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/dri/card#\x00'}}, {@euid_eq={'euid', 0x3d, r1}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/dri/card#\x00'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}]}) r2 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r3 = dup(r2) ioctl$int_out(r3, 0x0, &(0x7f0000000000)) ioctl$KVM_GET_ONE_REG(r3, 0x4010aeab, &(0x7f0000000280)={0xfffffffffffffffe, 0x2000000013}) [ 1766.727341][T10791] FAULT_INJECTION: forcing a failure. [ 1766.727341][T10791] name failslab, interval 1, probability 0, space 0, times 0 03:52:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = accept4(r0, 0x0, &(0x7f0000000200), 0x80000) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000240), &(0x7f00000002c0)=0x4) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x8, &(0x7f0000000340)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="29004b72f85b018e46fe0000040000000000000000000000010000000000000000000000000000000000fffff26a4cc68aee53134974c26d9d2b0f9c6a951db80ab76f3d7dfc4000d4589c28b1bbc1dbff40b0530840a93e8ccae9f84722f86f0b70225ac460b8715948559459f7a5fa202ec4b84af4c3ac922fcda76590c7c775dfc318fb425cede944488d5f12f6b9ed9d6c50a1806e1e80f10cf2a4803d5ba2f89712816540c2069cbc194834f6141effb0c216cb82a7cbe1e94f450f7a5a145d06a7e60cc56812ffd2704122ad9865d4abacd1492f076c86df47f8c799ee3ebb0bda00c26fbbdc5c000000b637bee4498c2237164038e7ee67b83305b0"], 0x29) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x408040, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x20}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000180)={r4, 0xffffffff}, &(0x7f00000001c0)=0x8) 03:52:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="000000000b000001d4ffdf24ce21bafaa6e141c429b81a46cdf6f8f4c2543e9bc0b2e7f0b901b83057381302965db3774778c0608b1651ea1702ac0fb0511ff011e694fcd43254a94be3c607a9463acad041be5a98e9a678211d573e8dae675ec09192466d85ff314d26fe4c9b210b30daf915a2fa77301cbc2992fdaaa56e2057b26bea7e13f9a71f7d7fd485e7", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/mixer\x00', 0x101000, 0x0) r3 = fcntl$getown(r0, 0x9) mq_notify(r2, &(0x7f0000000480)={0x0, 0x39, 0x4, @tid=r3}) r4 = accept4$inet(r1, &(0x7f0000000040)={0x2, 0x0, @dev}, &(0x7f00000000c0)=0x10, 0x800) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f00000002c0), &(0x7f0000000380)=0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @rand_addr=0xf986}}, 0x10000, 0x1}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000240)={r5, 0xfffffffffffff215}, &(0x7f0000000340)=0x8) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) [ 1766.794814][T10791] CPU: 1 PID: 10791 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1766.803973][T10791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1766.814036][T10791] Call Trace: [ 1766.817355][T10791] dump_stack+0x172/0x1f0 [ 1766.821712][T10791] should_fail.cold+0xa/0x15 [ 1766.826398][T10791] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1766.832228][T10791] ? ___might_sleep+0x163/0x280 [ 1766.837071][T10791] __should_failslab+0x121/0x190 [ 1766.842150][T10791] should_failslab+0x9/0x14 [ 1766.846659][T10791] kmem_cache_alloc_node_trace+0x270/0x720 [ 1766.852543][T10791] ? kmem_cache_alloc_trace+0x354/0x760 [ 1766.858099][T10791] __kmalloc_node+0x3d/0x70 [ 1766.862599][T10791] kvmalloc_node+0x68/0x100 [ 1766.867125][T10791] __list_lru_init+0x4a6/0x6e0 [ 1766.871880][T10791] alloc_super+0x78d/0x890 [ 1766.876283][T10791] ? test_single_super+0x10/0x10 [ 1766.881236][T10791] sget_userns+0xf1/0x560 [ 1766.885552][T10791] ? kill_litter_super+0x60/0x60 [ 1766.890475][T10791] ? test_single_super+0x10/0x10 [ 1766.895575][T10791] ? kill_litter_super+0x60/0x60 [ 1766.900502][T10791] sget+0x10c/0x150 [ 1766.904322][T10791] mount_bdev+0xff/0x3c0 [ 1766.908566][T10791] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1766.913667][T10791] jfs_do_mount+0x35/0x40 [ 1766.917992][T10791] ? jfs_get_dquots+0x20/0x20 [ 1766.922791][T10791] legacy_get_tree+0xf2/0x200 [ 1766.927455][T10791] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1766.933697][T10791] vfs_get_tree+0x123/0x450 [ 1766.938188][T10791] do_mount+0x1436/0x2c40 [ 1766.942581][T10791] ? copy_mount_string+0x40/0x40 [ 1766.947539][T10791] ? _copy_from_user+0xdd/0x150 [ 1766.952390][T10791] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1766.958630][T10791] ? copy_mount_options+0x280/0x3a0 [ 1766.963872][T10791] ksys_mount+0xdb/0x150 [ 1766.968112][T10791] __x64_sys_mount+0xbe/0x150 [ 1766.972776][T10791] do_syscall_64+0x103/0x610 [ 1766.977367][T10791] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1766.983258][T10791] RIP: 0033:0x458209 [ 1766.987241][T10791] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1767.006917][T10791] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1767.015824][T10791] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 [ 1767.023805][T10791] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1767.031763][T10791] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 03:52:30 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0xfffffffffffff399) [ 1767.039720][T10791] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1767.047699][T10791] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 [ 1767.056278][ C1] net_ratelimit: 22 callbacks suppressed [ 1767.056287][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1767.067808][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:52:30 executing program 4 (fault-call:1 fault-nth:48): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:31 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0xffffffffffffffff) [ 1767.271922][T10823] FAULT_INJECTION: forcing a failure. [ 1767.271922][T10823] name failslab, interval 1, probability 0, space 0, times 0 [ 1767.315040][T10823] CPU: 0 PID: 10823 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1767.324632][T10823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1767.334694][T10823] Call Trace: [ 1767.338006][T10823] dump_stack+0x172/0x1f0 [ 1767.342374][T10823] should_fail.cold+0xa/0x15 [ 1767.347080][T10823] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1767.352910][T10823] ? ___might_sleep+0x163/0x280 [ 1767.357772][T10823] __should_failslab+0x121/0x190 [ 1767.362723][T10823] should_failslab+0x9/0x14 [ 1767.367222][T10823] kmem_cache_alloc_trace+0x2d1/0x760 [ 1767.372601][T10823] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1767.378449][T10823] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1767.378471][T10823] __list_lru_init+0x3cf/0x6e0 [ 1767.378490][T10823] alloc_super+0x78d/0x890 [ 1767.378505][T10823] ? test_single_super+0x10/0x10 [ 1767.378520][T10823] sget_userns+0xf1/0x560 [ 1767.378532][T10823] ? kill_litter_super+0x60/0x60 [ 1767.378547][T10823] ? test_single_super+0x10/0x10 [ 1767.378566][T10823] ? kill_litter_super+0x60/0x60 [ 1767.388952][T10823] sget+0x10c/0x150 [ 1767.388970][T10823] mount_bdev+0xff/0x3c0 [ 1767.388986][T10823] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1767.389005][T10823] jfs_do_mount+0x35/0x40 [ 1767.389020][T10823] ? jfs_get_dquots+0x20/0x20 [ 1767.389036][T10823] legacy_get_tree+0xf2/0x200 [ 1767.389072][T10823] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1767.450619][T10823] vfs_get_tree+0x123/0x450 [ 1767.455111][T10823] do_mount+0x1436/0x2c40 [ 1767.459425][T10823] ? copy_mount_string+0x40/0x40 [ 1767.464354][T10823] ? _copy_from_user+0xdd/0x150 [ 1767.469189][T10823] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1767.475410][T10823] ? copy_mount_options+0x280/0x3a0 [ 1767.480595][T10823] ksys_mount+0xdb/0x150 [ 1767.484824][T10823] __x64_sys_mount+0xbe/0x150 [ 1767.489489][T10823] do_syscall_64+0x103/0x610 [ 1767.494065][T10823] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1767.499967][T10823] RIP: 0033:0x458209 [ 1767.503852][T10823] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1767.523550][T10823] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1767.531954][T10823] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 [ 1767.539908][T10823] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1767.547877][T10823] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1767.555861][T10823] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1767.563812][T10823] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 [ 1767.817809][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1767.823614][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1767.977787][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1767.983690][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1767.989636][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1767.995406][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1768.001305][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1768.007059][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:52:33 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:52:33 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000080)={0xfffffffffffffffe, 0x2000000011}) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="06000000000000001f0000c00000000033740000400001000500000000000000070000805fff0000a6b300003f0000000300000000007eaca53ecf8c735dbebc00000a0000000100010009000000010000000700000000000000010000c02d0d000005000000000000000600000000000000020000c009000000ffffffff090000000000000000080000000100010000000000"]) 03:52:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x400000) ioctl$CAPI_MANUFACTURER_CMD(r2, 0xc0104320, &(0x7f00000000c0)={0x9, &(0x7f0000000140)="9dca592023f6f3e56da14c3eae0354ab3b9f91fccd4a530d3e1037f5d41d55166e03d558d2ef89ece86fc21470846947aa76ff3818eec1f4de6a17988892a7abe51b433a524f3983c46061c7738df8e00f7f6b75ae6080a352e60538f2c055389e4afd4747b56f90028a74"}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="916f3f005f69df9a1000", @ANYRESDEC=0x0, @ANYBLOB="fe6d"]) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) setsockopt$CAIFSO_REQ_PARAM(r2, 0x116, 0x80, &(0x7f0000000140)="dee7a27c97a3c262caf257c6535e815647593f543ba60eb05769ea6ff50f2cfdd732c543620262e9eb9c6e362acc1e6d23689eb345ea633c0e2264c16cd90597e0e6fea37071b1c0bca1462452fb1302a8e9933260340acf0135cf1b8a9d3aa525ce1d4b152c150576f1d11055bc4fb6b2c20e5eb850121226d4fd43c38f0f81b6c1082fd60ddd742ae5f9e20d89bb64a3a2a8e25bebd0e3ef305d5ed99ecaac6c6f5286e088d1d3145dd07e7dc5cd27984029e1f1a323c96608dafad55cafce0f733cf7360a673d4ba95a609d5194f718df0d", 0xd3) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0x18) 03:52:33 executing program 3: io_setup(0x9, &(0x7f0000000000)) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x3ff, 0x40) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) setns(r1, 0x8000000) 03:52:33 executing program 4 (fault-call:1 fault-nth:49): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1769.788430][T10841] FAULT_INJECTION: forcing a failure. [ 1769.788430][T10841] name failslab, interval 1, probability 0, space 0, times 0 [ 1769.838569][T10841] CPU: 0 PID: 10841 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1769.847718][T10841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1769.857779][T10841] Call Trace: [ 1769.861087][T10841] dump_stack+0x172/0x1f0 [ 1769.865438][T10841] should_fail.cold+0xa/0x15 [ 1769.870048][T10841] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1769.875872][T10841] ? ___might_sleep+0x163/0x280 [ 1769.880751][T10841] __should_failslab+0x121/0x190 03:52:33 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x20000, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000280)={0xfffffffffffffffe, 0x2000000013}) 03:52:33 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20\x00', 0x101000, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000340)={{0x1, 0x3, 0xce, 0x2, 0x3e}, 0x1f, 0x7000000000000000}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000020000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl(r0, 0x1000008917, &(0x7f00000002c0)="0ae61f123c123f3188b0707638549a179522d084b15cda582bf8e458bb1e350f40f1b45c80ea22abef") write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x101200, 0x81) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, r3, 0x800, 0x70bd2c, 0x25dfdbfb, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e22}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e23}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40080}, 0x20008000) [ 1769.885785][T10841] should_failslab+0x9/0x14 [ 1769.890302][T10841] kmem_cache_alloc_trace+0x2d1/0x760 [ 1769.895693][T10841] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1769.901517][T10841] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1769.907352][T10841] __list_lru_init+0x3cf/0x6e0 [ 1769.912223][T10841] alloc_super+0x78d/0x890 [ 1769.916839][T10841] ? test_single_super+0x10/0x10 [ 1769.916855][T10841] sget_userns+0xf1/0x560 [ 1769.916867][T10841] ? kill_litter_super+0x60/0x60 [ 1769.916882][T10841] ? test_single_super+0x10/0x10 [ 1769.916893][T10841] ? kill_litter_super+0x60/0x60 [ 1769.916905][T10841] sget+0x10c/0x150 [ 1769.916922][T10841] mount_bdev+0xff/0x3c0 [ 1769.916937][T10841] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1769.916968][T10841] jfs_do_mount+0x35/0x40 [ 1769.931208][T10841] ? jfs_get_dquots+0x20/0x20 [ 1769.931228][T10841] legacy_get_tree+0xf2/0x200 [ 1769.931245][T10841] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1769.931262][T10841] vfs_get_tree+0x123/0x450 [ 1769.931277][T10841] do_mount+0x1436/0x2c40 [ 1769.931297][T10841] ? copy_mount_string+0x40/0x40 03:52:33 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_API_VERSION(r1, 0xae00, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x100000001, 0x0, 0x7, 0x6, @time={0x0, 0x989680}, {0x800, 0x5}, {0x5, 0x62}, @result={0x3, 0x2}}], 0x30) prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000ffd000/0x3000)=nil) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000040)={0xb85, 0x2000000013}) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000100)=""/183) [ 1769.931312][T10841] ? _copy_from_user+0xdd/0x150 [ 1769.931328][T10841] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1769.931341][T10841] ? copy_mount_options+0x280/0x3a0 [ 1769.931358][T10841] ksys_mount+0xdb/0x150 [ 1769.931375][T10841] __x64_sys_mount+0xbe/0x150 [ 1769.931393][T10841] do_syscall_64+0x103/0x610 [ 1769.931414][T10841] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1769.931433][T10841] RIP: 0033:0x458209 [ 1770.027987][T10841] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1770.047890][T10841] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1770.047905][T10841] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 [ 1770.047914][T10841] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1770.047923][T10841] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1770.047932][T10841] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 03:52:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xfed, 0xa000) connect$caif(r1, &(0x7f00000000c0)=@dgm={0x25, 0x0, 0x7}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000140)={0x98, 0xa9, 0x0, 0x8}, 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") arch_prctl$ARCH_GET_CPUID(0x1011) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) socket$rds(0x15, 0x5, 0x0) 03:52:33 executing program 4 (fault-call:1 fault-nth:50): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1770.047941][T10841] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 03:52:33 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8, 0x4000) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000040)={0x70d, 0xdc, 0x40, 0x302, 0x40, 0x10001, 0x7}, 0xc) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) [ 1770.301836][T10873] FAULT_INJECTION: forcing a failure. [ 1770.301836][T10873] name failslab, interval 1, probability 0, space 0, times 0 [ 1770.318492][T10873] CPU: 1 PID: 10873 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1770.327615][T10873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1770.327623][T10873] Call Trace: [ 1770.327649][T10873] dump_stack+0x172/0x1f0 [ 1770.327672][T10873] should_fail.cold+0xa/0x15 [ 1770.341034][T10873] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1770.341056][T10873] ? ___might_sleep+0x163/0x280 [ 1770.341078][T10873] __should_failslab+0x121/0x190 [ 1770.350617][T10873] should_failslab+0x9/0x14 [ 1770.350636][T10873] kmem_cache_alloc_trace+0x2d1/0x760 [ 1770.350653][T10873] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1770.350676][T10873] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1770.350696][T10873] __list_lru_init+0x3cf/0x6e0 [ 1770.350721][T10873] alloc_super+0x78d/0x890 [ 1770.361517][T10873] ? test_single_super+0x10/0x10 [ 1770.361533][T10873] sget_userns+0xf1/0x560 [ 1770.361552][T10873] ? kill_litter_super+0x60/0x60 [ 1770.361566][T10873] ? test_single_super+0x10/0x10 [ 1770.361577][T10873] ? kill_litter_super+0x60/0x60 [ 1770.361595][T10873] sget+0x10c/0x150 [ 1770.361612][T10873] mount_bdev+0xff/0x3c0 [ 1770.361628][T10873] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1770.361649][T10873] jfs_do_mount+0x35/0x40 [ 1770.371761][T10873] ? jfs_get_dquots+0x20/0x20 [ 1770.371779][T10873] legacy_get_tree+0xf2/0x200 [ 1770.371794][T10873] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1770.371810][T10873] vfs_get_tree+0x123/0x450 [ 1770.371826][T10873] do_mount+0x1436/0x2c40 [ 1770.371846][T10873] ? copy_mount_string+0x40/0x40 [ 1770.474749][T10873] ? _copy_from_user+0xdd/0x150 [ 1770.479632][T10873] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1770.486124][T10873] ? copy_mount_options+0x280/0x3a0 [ 1770.491576][T10873] ksys_mount+0xdb/0x150 [ 1770.495815][T10873] __x64_sys_mount+0xbe/0x150 [ 1770.500605][T10873] do_syscall_64+0x103/0x610 [ 1770.505200][T10873] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1770.511087][T10873] RIP: 0033:0x458209 [ 1770.515176][T10873] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1770.535311][T10873] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1770.543756][T10873] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 [ 1770.551858][T10873] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1770.559834][T10873] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1770.567816][T10873] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1770.575913][T10873] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 [ 1772.137867][ C0] net_ratelimit: 18 callbacks suppressed [ 1772.137877][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1772.149461][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1772.155255][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1772.161082][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1772.167206][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1772.173216][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1772.179522][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1772.185379][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:52:36 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:52:36 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = dup(r0) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000280)={0xfffffffffffffffe, 0x2000000013}) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x10913, r0, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x4e20, @remote}, {0x2, 0x4e23, @remote}, {0x2, 0x4e23, @loopback}, 0x102, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)='lo\x00', 0x8, 0x3, 0x80}) 03:52:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_smack_entry(r1, &(0x7f0000000080)='security.SMACK64\x00', &(0x7f00000001c0)='fuse\x00', 0x5, 0x1) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x8000, 0x0) accept$alg(r2, 0x0, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000000018cf903000000000000000000000000010000001711e1b3f31762132ae07061b3e45e4200000000000000000000000000"], 0x29) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f00000000c0)=0xc) 03:52:36 executing program 4 (fault-call:1 fault-nth:51): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$CAPI_CLR_FLAGS(r0, 0x80044325, &(0x7f0000000040)=0x1) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:36 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = accept4$bt_l2cap(r0, &(0x7f0000000000), &(0x7f0000000040)=0xe, 0x0) connect$bt_l2cap(r1, &(0x7f00000000c0)={0x1f, 0x5, {0x0, 0xffffffff, 0x6, 0xfffffffffffffff9, 0x3, 0x11}, 0x1f, 0x100000000}, 0xe) r2 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x0, 0x2000) write$P9_RUNLINKAT(r2, &(0x7f0000000140)={0x7, 0x4d, 0x2}, 0x7) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) getsockopt$sock_buf(r1, 0x1, 0x1a, &(0x7f0000000180)=""/4096, &(0x7f0000001180)=0x1000) recvfrom(r2, &(0x7f00000011c0)=""/132, 0x84, 0x40000000, &(0x7f0000001280)=@isdn={0x22, 0x1, 0xffffffffffffff51, 0x40, 0x7fffffff}, 0x80) [ 1772.874871][T10886] FAULT_INJECTION: forcing a failure. [ 1772.874871][T10886] name failslab, interval 1, probability 0, space 0, times 0 03:52:36 executing program 5: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x9, 0x6d4, 0x5, 0x10000000000000, 0x707}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000140)={r2, 0x6}, &(0x7f0000000180)=0x8) r3 = dup(r0) ioctl$KVM_GET_ONE_REG(r3, 0x4010aeab, &(0x7f0000000000)={0x6, 0x2000000013}) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={r2, 0x5, 0x1}, &(0x7f0000000200)=0xc) 03:52:36 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:52:36 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x4000000002, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) eventfd(0x5) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x9, 0x40000) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000380)) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x34d080, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000040)={0x100000001, 0x5, 0x0, 0x50000000, 0x1, 0x5, 0xffffffff, 0xac79, 0x0}, &(0x7f00000000c0)=0x20) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000100)={r3, 0x7, 0xfe}, 0x8) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vfio/vfio\x00', 0x101001, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f00000002c0)={r2, r4, 0x1, 0xca, &(0x7f00000001c0)="1fffe5123b6fb1e22e075513ad90fcc13b08e82961a269a39e76b1df4ecc4ae128165f82f4472dc20a819187351ea795bf4105f066958b09ff1422c26599646daaef609bff7240e30ed2a9d64b23698396bfe0b2169b2338185d15ec419585d1cb4c277097b8a959e3efcde50b57b3a002ecde0ea99469634027fcd54560f7f4ee99ac9d9b52aed88d5635cfe40d42c2d091a496dbb970712fb799bb97cca167826111a0f3fbd48fb4d63483c421d8732b1a636cb5e5a0a9983d09851726efbeed0b55c1ae7b5e6b6baf", 0x9, 0x3f, 0x2, 0xfb, 0xfffffffffffffff8, 0x3, 0xffffffff, 'syz1\x00'}) [ 1772.925387][T10886] CPU: 0 PID: 10886 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1772.934628][T10886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1772.944708][T10886] Call Trace: [ 1772.948009][T10886] dump_stack+0x172/0x1f0 [ 1772.952362][T10886] should_fail.cold+0xa/0x15 [ 1772.956986][T10886] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1772.962913][T10886] ? ___might_sleep+0x163/0x280 [ 1772.967788][T10886] __should_failslab+0x121/0x190 [ 1772.967807][T10886] should_failslab+0x9/0x14 [ 1772.967823][T10886] kmem_cache_alloc_trace+0x2d1/0x760 [ 1772.967841][T10886] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1772.967866][T10886] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1772.967887][T10886] __list_lru_init+0x3cf/0x6e0 [ 1772.967907][T10886] alloc_super+0x78d/0x890 [ 1772.977350][T10886] ? test_single_super+0x10/0x10 [ 1772.977368][T10886] sget_userns+0xf1/0x560 [ 1772.977381][T10886] ? kill_litter_super+0x60/0x60 [ 1772.977396][T10886] ? test_single_super+0x10/0x10 [ 1772.977407][T10886] ? kill_litter_super+0x60/0x60 [ 1772.977418][T10886] sget+0x10c/0x150 [ 1772.977434][T10886] mount_bdev+0xff/0x3c0 [ 1772.977449][T10886] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1772.977469][T10886] jfs_do_mount+0x35/0x40 [ 1772.977484][T10886] ? jfs_get_dquots+0x20/0x20 [ 1772.977500][T10886] legacy_get_tree+0xf2/0x200 [ 1772.977522][T10886] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1773.035658][T10886] vfs_get_tree+0x123/0x450 [ 1773.035678][T10886] do_mount+0x1436/0x2c40 [ 1773.035701][T10886] ? copy_mount_string+0x40/0x40 [ 1773.035717][T10886] ? _copy_from_user+0xdd/0x150 [ 1773.035739][T10886] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1773.065339][T10886] ? copy_mount_options+0x280/0x3a0 [ 1773.065361][T10886] ksys_mount+0xdb/0x150 [ 1773.065380][T10886] __x64_sys_mount+0xbe/0x150 [ 1773.065400][T10886] do_syscall_64+0x103/0x610 [ 1773.065423][T10886] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1773.065435][T10886] RIP: 0033:0x458209 03:52:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x280e00, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f00000000c0)={0x8}, 0x4) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="992c334a000000"]) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="290000000400000000000000000000008d1fe3bd000000000000000000000000010000000000000000"], 0x29) [ 1773.065450][T10886] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1773.065458][T10886] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1773.142488][T10886] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 [ 1773.150558][T10886] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1773.158542][T10886] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1773.166559][T10886] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1773.174546][T10886] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 03:52:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x104) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f00000000c0)=""/126) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:52:37 executing program 4 (fault-call:1 fault-nth:52): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1773.257873][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1773.263741][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:52:37 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x0, 0x0) ioctl$CAPI_GET_FLAGS(r0, 0x80044323, &(0x7f0000000240)) r1 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x1, 0x0) r2 = dup(r1) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f0000000280)={0xfffffffffffffffe, 0x2000000013}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r1, 0x0, 0x1, &(0x7f0000000000)='\x00', 0xffffffffffffffff}, 0x30) ptrace$getregset(0x4204, r3, 0x201, &(0x7f0000000080)={&(0x7f0000000100)=""/244, 0xf4}) [ 1773.423379][T10926] FAULT_INJECTION: forcing a failure. [ 1773.423379][T10926] name failslab, interval 1, probability 0, space 0, times 0 [ 1773.451778][T10926] CPU: 1 PID: 10926 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1773.460938][T10926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 03:52:37 executing program 5: socket$netlink(0x10, 0x3, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x402040, 0x0) accept4$alg(r0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x101042, 0x0) r2 = creat(0x0, 0x2) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX3(r1, 0x541c, &(0x7f00000002c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000300)=[@mss={0x2, 0x5968}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/netlink\x00m\x10\x1bDv\xe5j@\xca\x98\"X\xc7k\xb9u\x17w\xed*\xb23\xa9#\xcb\x12\x97\xe9U\x18\xd4\x8d\b\xfc\x845j\x18z\r\xd6\xea\xacE\xd3G\xa9Ki(\xf3\xa3\xfa\xf1\x11(b\am\xd21\x91Q\xbe}\xa3\x8b\r\xc2TR\xa9\tm\x1f\x12hf\xc6\xfa!\x8eK\xd9\x90K\xfa\xc1\x1d\xa9i\x17\a\xdb+\x95Z /\xc9\xafk\xb3!\x05\x17\xcb\x05\tX\x9c~\x85O\x97\x8f\xcc\xcc\xe4\xcb=\xdb\xdf\x1a\x81N\x01>\xdb7\xe3\xe3\xae;3\x8fF\x18\xa4Y `nu\xab!\x9dG\xea\x06\xa7\x83\t\x9b<\x10\xad\a\xb5Ia\xb4f\x97\xb7a4!\xe5h\xabk\x7f\xc4\x9d8\xdb>') preadv(r3, 0x0, 0x0, 0x4c000000) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x3c}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x6}}, 0xe8) sendmmsg(r4, &(0x7f0000000480), 0x2e9, 0xffd8) 03:52:37 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0xfffffffffffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:52:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x20, &(0x7f0000000040)='\x00') write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) [ 1773.471187][T10926] Call Trace: [ 1773.474505][T10926] dump_stack+0x172/0x1f0 [ 1773.478865][T10926] should_fail.cold+0xa/0x15 [ 1773.483480][T10926] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1773.489286][T10926] ? ___might_sleep+0x163/0x280 [ 1773.494250][T10926] __should_failslab+0x121/0x190 [ 1773.499292][T10926] should_failslab+0x9/0x14 [ 1773.503810][T10926] kmem_cache_alloc_trace+0x2d1/0x760 [ 1773.509305][T10926] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1773.515132][T10926] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1773.520771][T10926] __list_lru_init+0x3cf/0x6e0 [ 1773.525543][T10926] alloc_super+0x78d/0x890 [ 1773.530248][T10926] ? test_single_super+0x10/0x10 [ 1773.535173][T10926] sget_userns+0xf1/0x560 [ 1773.539509][T10926] ? kill_litter_super+0x60/0x60 [ 1773.544459][T10926] ? test_single_super+0x10/0x10 [ 1773.549415][T10926] ? kill_litter_super+0x60/0x60 [ 1773.554431][T10926] sget+0x10c/0x150 [ 1773.558256][T10926] mount_bdev+0xff/0x3c0 [ 1773.562794][T10926] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1773.567928][T10926] jfs_do_mount+0x35/0x40 [ 1773.572250][T10926] ? jfs_get_dquots+0x20/0x20 [ 1773.576918][T10926] legacy_get_tree+0xf2/0x200 [ 1773.581582][T10926] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1773.587980][T10926] vfs_get_tree+0x123/0x450 [ 1773.592492][T10926] do_mount+0x1436/0x2c40 [ 1773.596819][T10926] ? copy_mount_string+0x40/0x40 [ 1773.601768][T10926] ? _copy_from_user+0xdd/0x150 [ 1773.606653][T10926] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1773.613012][T10926] ? copy_mount_options+0x280/0x3a0 [ 1773.618289][T10926] ksys_mount+0xdb/0x150 [ 1773.622534][T10926] __x64_sys_mount+0xbe/0x150 [ 1773.627208][T10926] do_syscall_64+0x103/0x610 [ 1773.631888][T10926] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1773.639120][T10926] RIP: 0033:0x458209 [ 1773.644070][T10926] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1773.663720][T10926] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 03:52:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67a8d43a635f5cce3d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) [ 1773.672144][T10926] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 [ 1773.680133][T10926] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1773.688095][T10926] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1773.696077][T10926] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1773.704160][T10926] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 03:52:37 executing program 4 (fault-call:1 fault-nth:53): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1773.938837][T10947] FAULT_INJECTION: forcing a failure. [ 1773.938837][T10947] name failslab, interval 1, probability 0, space 0, times 0 [ 1773.958213][T10947] CPU: 0 PID: 10947 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1773.967344][T10947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1773.977406][T10947] Call Trace: [ 1773.980719][T10947] dump_stack+0x172/0x1f0 [ 1773.985083][T10947] should_fail.cold+0xa/0x15 [ 1773.989699][T10947] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1773.995530][T10947] ? ___might_sleep+0x163/0x280 [ 1774.000404][T10947] __should_failslab+0x121/0x190 [ 1774.005362][T10947] should_failslab+0x9/0x14 [ 1774.009870][T10947] kmem_cache_alloc_trace+0x2d1/0x760 [ 1774.009889][T10947] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1774.009912][T10947] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1774.009932][T10947] __list_lru_init+0x3cf/0x6e0 [ 1774.009951][T10947] alloc_super+0x78d/0x890 [ 1774.009965][T10947] ? test_single_super+0x10/0x10 [ 1774.009980][T10947] sget_userns+0xf1/0x560 [ 1774.010006][T10947] ? kill_litter_super+0x60/0x60 [ 1774.050380][T10947] ? test_single_super+0x10/0x10 [ 1774.055344][T10947] ? kill_litter_super+0x60/0x60 [ 1774.060295][T10947] sget+0x10c/0x150 [ 1774.064123][T10947] mount_bdev+0xff/0x3c0 [ 1774.064146][T10947] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1774.073499][T10947] jfs_do_mount+0x35/0x40 [ 1774.077845][T10947] ? jfs_get_dquots+0x20/0x20 [ 1774.082539][T10947] legacy_get_tree+0xf2/0x200 [ 1774.082556][T10947] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1774.082572][T10947] vfs_get_tree+0x123/0x450 [ 1774.082597][T10947] do_mount+0x1436/0x2c40 [ 1774.082619][T10947] ? copy_mount_string+0x40/0x40 [ 1774.082635][T10947] ? _copy_from_user+0xdd/0x150 [ 1774.082659][T10947] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1774.118621][T10947] ? copy_mount_options+0x280/0x3a0 [ 1774.123845][T10947] ksys_mount+0xdb/0x150 [ 1774.128107][T10947] __x64_sys_mount+0xbe/0x150 [ 1774.132807][T10947] do_syscall_64+0x103/0x610 [ 1774.137690][T10947] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1774.143712][T10947] RIP: 0033:0x458209 [ 1774.147981][T10947] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1774.167890][T10947] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1774.176321][T10947] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 [ 1774.184307][T10947] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1774.193808][T10947] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1774.201796][T10947] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1774.209789][T10947] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 03:52:39 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:52:39 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000040)={0x1, 0x8001, 0x5, @broadcast, 'veth0_to_bridge\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@initdev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000200)={@dev={0xac, 0x14, 0x14, 0x10}, @local, r2}, 0xc) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:52:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x800, 0x0) dup2(r0, r0) r1 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x4) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="290000000406d36e8a68ba64ba00000000000000000000000100000000000000000000000000004001"], 0x29) 03:52:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000040)) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x200, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000240)=r2, 0x4) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000200)='rxrpc\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="0c3988bfa14f7f7b84121bb8403733b6efe5c465454dc80610b0dea8196d90d4856d262957ddf769e489da162153b86c9210a61b2f59070eb0cd9dd813106596f7c4445954221b3c7f8a0dec4a439a00020000d8b420", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r2, &(0x7f00000002c0)=ANY=[@ANYRES64=r1, @ANYRES16, @ANYRES16=r0], 0xc) getsockopt(r0, 0xd003, 0x2, &(0x7f0000000480)=""/246, &(0x7f00000001c0)=0xf6) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="0800000800dd9affff00f4fffff6f4e12e12439e"], &(0x7f0000000340)=0x14) 03:52:39 executing program 4 (fault-call:1 fault-nth:54): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:39 executing program 5: shmget$private(0x0, 0x3000, 0x80, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_LOCK(0x0, 0xb) keyctl$set_reqkey_keyring(0xe, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x52000, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$apparmor_exec(r2, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x1f, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xe80a}, 0x1c) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) mount$fuseblk(0x0, 0x0, 0x0, 0x0, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) openat$rtc(0xffffffffffffff9c, 0x0, 0x2000, 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x3) setitimer(0x1, &(0x7f0000000180)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) splice(r1, 0x0, r3, 0x0, 0x810003, 0x0) 03:52:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="29000000040000000000000000000000010000e8ffffffffffffff0000120000010000000000000000"], 0x29) [ 1776.108729][T10963] FAULT_INJECTION: forcing a failure. [ 1776.108729][T10963] name failslab, interval 1, probability 0, space 0, times 0 03:52:39 executing program 3: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x4000fffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x10000104e20, @empty}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x40, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x2, 0x4e20}, 0x10) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto(r2, &(0x7f0000000200), 0x40000, 0x0, 0x0, 0x0) r3 = dup(r0) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') ioctl$VIDIOC_S_AUDOUT(r3, 0x40345632, &(0x7f0000000240)={0x401, "6a9224b6240b9a1c63f65eaffb56b9c224b42c41f5fe73cfdbe78a541a71659b", 0x3, 0x1}) sendmsg$FOU_CMD_GET(r3, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="00022abd7000fcdbdf2503000000080003002b00000004000500080001004e2400000400050004000500080003003c000000080001004e240000080002000200000000000000"], 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x14) recvmmsg(r0, &(0x7f00000038c0)=[{{0x0, 0xc0, 0x0}}], 0x57b, 0x2, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) [ 1776.161489][T10963] CPU: 1 PID: 10963 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1776.170825][T10963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1776.180892][T10963] Call Trace: [ 1776.184387][T10963] dump_stack+0x172/0x1f0 [ 1776.189407][T10963] should_fail.cold+0xa/0x15 [ 1776.194083][T10963] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1776.200118][T10963] ? ___might_sleep+0x163/0x280 [ 1776.204972][T10963] __should_failslab+0x121/0x190 [ 1776.209918][T10963] should_failslab+0x9/0x14 [ 1776.214432][T10963] kmem_cache_alloc_trace+0x2d1/0x760 [ 1776.221134][T10963] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1776.228031][T10963] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1776.233967][T10963] __list_lru_init+0x3cf/0x6e0 [ 1776.239457][T10963] alloc_super+0x78d/0x890 [ 1776.243959][T10963] ? test_single_super+0x10/0x10 [ 1776.248910][T10963] sget_userns+0xf1/0x560 [ 1776.253259][T10963] ? kill_litter_super+0x60/0x60 [ 1776.258406][T10963] ? test_single_super+0x10/0x10 [ 1776.264652][T10963] ? kill_litter_super+0x60/0x60 [ 1776.269979][T10963] sget+0x10c/0x150 [ 1776.273858][T10963] mount_bdev+0xff/0x3c0 [ 1776.278127][T10963] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1776.283266][T10963] jfs_do_mount+0x35/0x40 [ 1776.287619][T10963] ? jfs_get_dquots+0x20/0x20 [ 1776.292471][T10963] legacy_get_tree+0xf2/0x200 [ 1776.298304][T10963] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1776.304628][T10963] vfs_get_tree+0x123/0x450 [ 1776.309137][T10963] do_mount+0x1436/0x2c40 [ 1776.313464][T10963] ? copy_mount_string+0x40/0x40 [ 1776.325571][T10963] ? _copy_from_user+0xdd/0x150 [ 1776.330429][T10963] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1776.336673][T10963] ? copy_mount_options+0x280/0x3a0 [ 1776.341893][T10963] ksys_mount+0xdb/0x150 [ 1776.346354][T10963] __x64_sys_mount+0xbe/0x150 [ 1776.351147][T10963] do_syscall_64+0x103/0x610 [ 1776.355750][T10963] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1776.362506][T10963] RIP: 0033:0x458209 [ 1776.366402][T10963] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1776.386200][T10963] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1776.397851][T10963] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 03:52:40 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:52:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0xfffdffbffffffffc, 0xfffffffffffffe18, 0x0, [0x0]}}, 0x29) [ 1776.405962][T10963] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1776.413929][T10963] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1776.422118][T10963] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1776.430088][T10963] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 03:52:40 executing program 4 (fault-call:1 fault-nth:55): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1776.536867][T10980] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:52:40 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:52:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x4, 0x0) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f00000000c0)={0x7}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x3, 0x1, 0x0, [0x0]}}, 0x29) lsetxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U-', 0x2}, 0x28, 0x2) pipe2(&(0x7f0000000140), 0x80000) 03:52:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}}, {@max_read={'max_read', 0x3d, 0x1f}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0xa00}}]}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x41, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xf0, r3, 0x0, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xde}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7ff}]}, @TIPC_NLA_LINK={0x68, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x13135c7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}]}, 0xf0}, 0x1, 0x0, 0x0, 0x4}, 0x8000) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x4003, 0x0) [ 1776.681454][T10993] FAULT_INJECTION: forcing a failure. [ 1776.681454][T10993] name failslab, interval 1, probability 0, space 0, times 0 [ 1776.697325][T10993] CPU: 1 PID: 10993 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1776.706459][T10993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1776.716525][T10993] Call Trace: [ 1776.716559][T10993] dump_stack+0x172/0x1f0 [ 1776.724460][T10993] should_fail.cold+0xa/0x15 [ 1776.729155][T10993] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1776.729175][T10993] ? ___might_sleep+0x163/0x280 [ 1776.729191][T10993] __should_failslab+0x121/0x190 [ 1776.729206][T10993] should_failslab+0x9/0x14 [ 1776.729222][T10993] kmem_cache_alloc_trace+0x2d1/0x760 [ 1776.729245][T10993] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1776.744888][T10993] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1776.766405][T10993] __list_lru_init+0x3cf/0x6e0 [ 1776.772430][T10993] alloc_super+0x78d/0x890 [ 1776.772449][T10993] ? test_single_super+0x10/0x10 [ 1776.781794][T10993] sget_userns+0xf1/0x560 [ 1776.781807][T10993] ? kill_litter_super+0x60/0x60 [ 1776.781821][T10993] ? test_single_super+0x10/0x10 [ 1776.781832][T10993] ? kill_litter_super+0x60/0x60 [ 1776.781843][T10993] sget+0x10c/0x150 [ 1776.781859][T10993] mount_bdev+0xff/0x3c0 [ 1776.781882][T10993] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1776.791238][T10993] jfs_do_mount+0x35/0x40 [ 1776.801112][T10993] ? jfs_get_dquots+0x20/0x20 [ 1776.801128][T10993] legacy_get_tree+0xf2/0x200 [ 1776.801144][T10993] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1776.801160][T10993] vfs_get_tree+0x123/0x450 [ 1776.801176][T10993] do_mount+0x1436/0x2c40 [ 1776.801197][T10993] ? copy_mount_string+0x40/0x40 [ 1776.828185][T10993] ? _copy_from_user+0xdd/0x150 [ 1776.828205][T10993] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1776.828226][T10993] ? copy_mount_options+0x280/0x3a0 [ 1776.864760][T10993] ksys_mount+0xdb/0x150 [ 1776.869213][T10993] __x64_sys_mount+0xbe/0x150 [ 1776.873917][T10993] do_syscall_64+0x103/0x610 [ 1776.878536][T10993] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1776.884448][T10993] RIP: 0033:0x458209 [ 1776.888597][T10993] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1776.908299][T10993] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1776.916925][T10993] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 03:52:40 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9, 0x200000) r2 = getpid() ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={[], 0x611acb29, 0x4, 0xfffffffffffffff9, 0x9, 0x8, r2}) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) [ 1776.925017][T10993] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1776.933023][T10993] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1776.941100][T10993] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1776.949302][T10993] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 03:52:40 executing program 4 (fault-call:1 fault-nth:56): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1777.195389][T11016] FAULT_INJECTION: forcing a failure. [ 1777.195389][T11016] name failslab, interval 1, probability 0, space 0, times 0 [ 1777.254479][T11016] CPU: 0 PID: 11016 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1777.263630][T11016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1777.274217][T11016] Call Trace: [ 1777.277536][T11016] dump_stack+0x172/0x1f0 [ 1777.281893][T11016] should_fail.cold+0xa/0x15 [ 1777.286485][T11016] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1777.292304][T11016] ? ___might_sleep+0x163/0x280 [ 1777.298056][T11016] __should_failslab+0x121/0x190 [ 1777.303004][T11016] should_failslab+0x9/0x14 [ 1777.307509][T11016] kmem_cache_alloc_trace+0x2d1/0x760 [ 1777.312890][T11016] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1777.318710][T11016] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1777.324355][T11016] __list_lru_init+0x3cf/0x6e0 [ 1777.329125][T11016] alloc_super+0x78d/0x890 [ 1777.333549][T11016] ? test_single_super+0x10/0x10 [ 1777.338501][T11016] sget_userns+0xf1/0x560 [ 1777.342860][T11016] ? kill_litter_super+0x60/0x60 [ 1777.347825][T11016] ? test_single_super+0x10/0x10 [ 1777.352753][T11016] ? kill_litter_super+0x60/0x60 [ 1777.357684][T11016] sget+0x10c/0x150 [ 1777.361499][T11016] mount_bdev+0xff/0x3c0 [ 1777.365753][T11016] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1777.370870][T11016] jfs_do_mount+0x35/0x40 [ 1777.375221][T11016] ? jfs_get_dquots+0x20/0x20 [ 1777.379903][T11016] legacy_get_tree+0xf2/0x200 [ 1777.384597][T11016] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1777.390858][T11016] vfs_get_tree+0x123/0x450 [ 1777.395365][T11016] do_mount+0x1436/0x2c40 [ 1777.399789][T11016] ? copy_mount_string+0x40/0x40 [ 1777.404757][T11016] ? _copy_from_user+0xdd/0x150 [ 1777.409794][T11016] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1777.416045][T11016] ? copy_mount_options+0x280/0x3a0 [ 1777.417870][ C1] net_ratelimit: 22 callbacks suppressed [ 1777.417878][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1777.421262][T11016] ksys_mount+0xdb/0x150 [ 1777.426959][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1777.432631][T11016] __x64_sys_mount+0xbe/0x150 [ 1777.432651][T11016] do_syscall_64+0x103/0x610 [ 1777.432671][T11016] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1777.432682][T11016] RIP: 0033:0x458209 [ 1777.432696][T11016] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1777.432703][T11016] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1777.432724][T11016] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 03:52:41 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x120ffc, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x100, 0x80003) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)={0x50, r2, 0x420, 0x70bd2c, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x101}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1140000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x4000) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) pipe(&(0x7f0000000000)) [ 1777.500190][T11016] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1777.508346][T11016] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1777.516324][T11016] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1777.524320][T11016] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 03:52:41 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)) r0 = memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000000), 0xffd7) gettid() getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000008600), 0x400017e, 0x0) 03:52:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) getsockopt(r0, 0x8000, 0x5, &(0x7f0000000140)=""/201, &(0x7f0000000040)=0xc9) r2 = syz_open_dev$audion(&(0x7f00000004c0)='/dev/audio#\x00', 0x102, 0x40500) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000340)={0x0, 0x93, "104fa60d37479764683bd4166fc2a427ec4de190fe3783565255affb252c20d95b870f34bae0a07cbc053ae351e04a211e7d3565bad5ec497efe157fbae1e0e131cff5ac685529faa9c9aa5fb57bab8e0b1ebfde925b8120d2f01d182dfba55851c09d0f4edf839d725c22363121114a5a7335d74dcfaac79ec919032429a8cd96caa4041f3b268a8bce2bbceca56e5c2309b3"}, &(0x7f0000000240)=0x9b) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000002c0)={r3, 0x4, 0x4}, 0x8) 03:52:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000040)={0x2c, 0x4, 0x0, {0x6, 0x0, 0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x2c) 03:52:41 executing program 4 (fault-call:1 fault-nth:57): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:41 executing program 3: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$ashmem(0xffffffffffffff9c, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xffffffffffffff2a, 0x0) recvfrom$inet(r1, &(0x7f00000000c0)=""/156, 0x9c, 0x12000, &(0x7f0000000080)={0x2, 0x4e22, @remote}, 0x2a1) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:52:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="8400000000000000000000000030303030303030303030303030303034309b0e74d20000000000000000725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="1b2c00"]) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$FIGETBSZ(r0, 0x2, &(0x7f00000002c0)) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)=ANY=[], 0xffffffffffffff5b) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f00000003c0)={0xa2, &(0x7f0000000400)=[{0x0}]}) ioctl$DRM_IOCTL_DMA(r0, 0xc0406429, &(0x7f0000000240)={r2, 0x7, &(0x7f0000000140)=[0x70, 0x3, 0x1, 0xff, 0x400, 0x0, 0x9], &(0x7f0000000180)=[0xc2e6, 0x7f], 0x34, 0xa, 0xfa8, &(0x7f00000001c0)=[0xace, 0x30d, 0xc, 0x699, 0x3, 0x1ff, 0x7ff, 0x3, 0x5, 0x2], &(0x7f0000000200)=[0x10, 0x7fffffff, 0x1, 0x101, 0x2, 0x80000001, 0x200]}) [ 1777.789469][T11038] FAULT_INJECTION: forcing a failure. [ 1777.789469][T11038] name failslab, interval 1, probability 0, space 0, times 0 [ 1777.861382][T11038] CPU: 1 PID: 11038 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1777.870523][T11038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1777.880604][T11038] Call Trace: [ 1777.884011][T11038] dump_stack+0x172/0x1f0 [ 1777.888457][T11038] should_fail.cold+0xa/0x15 [ 1777.893077][T11038] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1777.898932][T11038] ? ___might_sleep+0x163/0x280 [ 1777.903842][T11038] __should_failslab+0x121/0x190 [ 1777.908793][T11038] should_failslab+0x9/0x14 [ 1777.913319][T11038] kmem_cache_alloc_trace+0x2d1/0x760 [ 1777.918878][T11038] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1777.924706][T11038] __memcg_init_list_lru_node+0x8a/0x1e0 [ 1777.930362][T11038] __list_lru_init+0x3cf/0x6e0 [ 1777.935160][T11038] alloc_super+0x78d/0x890 [ 1777.939586][T11038] ? test_single_super+0x10/0x10 [ 1777.944648][T11038] sget_userns+0xf1/0x560 [ 1777.948993][T11038] ? kill_litter_super+0x60/0x60 [ 1777.953939][T11038] ? test_single_super+0x10/0x10 [ 1777.958866][T11038] ? kill_litter_super+0x60/0x60 [ 1777.963790][T11038] sget+0x10c/0x150 [ 1777.967612][T11038] mount_bdev+0xff/0x3c0 [ 1777.971847][T11038] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1777.976945][T11038] jfs_do_mount+0x35/0x40 [ 1777.981261][T11038] ? jfs_get_dquots+0x20/0x20 [ 1777.985932][T11038] legacy_get_tree+0xf2/0x200 [ 1777.990608][T11038] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1777.996936][T11038] vfs_get_tree+0x123/0x450 [ 1778.001426][T11038] do_mount+0x1436/0x2c40 [ 1778.005752][T11038] ? copy_mount_string+0x40/0x40 [ 1778.010676][T11038] ? _copy_from_user+0xdd/0x150 [ 1778.015514][T11038] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1778.021922][T11038] ? copy_mount_options+0x280/0x3a0 [ 1778.027119][T11038] ksys_mount+0xdb/0x150 [ 1778.031348][T11038] __x64_sys_mount+0xbe/0x150 [ 1778.036103][T11038] do_syscall_64+0x103/0x610 [ 1778.040693][T11038] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1778.046572][T11038] RIP: 0033:0x458209 [ 1778.050454][T11038] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1778.070145][T11038] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1778.078541][T11038] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 [ 1778.086496][T11038] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1778.094454][T11038] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1778.102411][T11038] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1778.110366][T11038] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 [ 1778.217823][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1778.223752][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1778.457822][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1778.463746][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1778.469636][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1778.475385][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1778.481256][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1778.487004][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:52:43 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:52:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="60347cb0a13c2ce0e87d17026e7cd42d5ec5fe67b333d43c7fc24b", @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030313060ad9bc499885db22c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0262"]) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) r2 = open(&(0x7f0000000040)='./file0\x00', 0x101000, 0x14) getsockopt$TIPC_CONN_TIMEOUT(r2, 0x10f, 0x82, &(0x7f00000000c0), &(0x7f0000000140)=0x4) 03:52:43 executing program 5: r0 = open(&(0x7f0000000040)='./file1\x00', 0x400040, 0x0) keyctl$set_reqkey_keyring(0xe, 0x0) close(r0) stat(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001f00)) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0xfffffdbf) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000080)={0x0, {{0xa, 0x0, 0x0, @empty}}}, 0x90) 03:52:43 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) fsetxattr(r0, &(0x7f0000000000)=@known='com.apple.FinderInfo\x00', &(0x7f0000000040)='/dev/ashmem\x00', 0xc, 0x2) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) modify_ldt$write(0x1, &(0x7f00000000c0)={0xffffffff80000001, 0x20001800, 0x1000, 0x8, 0xfff, 0x6, 0x8b24, 0x80000001, 0x3, 0x48}, 0x10) 03:52:43 executing program 4 (fault-call:1 fault-nth:58): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:43 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:52:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643daeec11918da63a13a1ce2235489d06b34a05c1f4a20283dc7b0348e86078dcc9c4421f487aa10e1905fbad70e340f1fdf3c2aafcd59ed0fc30b93bc4085782c1ecde96ea4b643597a0c14dbe632b6a5b19ab950b62c8516d6e4a28c47a58881f00bb09533703d6b514d154c497", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) [ 1780.099943][T11063] FAULT_INJECTION: forcing a failure. [ 1780.099943][T11063] name failslab, interval 1, probability 0, space 0, times 0 03:52:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x40000, 0x0) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f00000000c0)={0x37, 0x29, 0x5, 0x1a, 0x8, 0x1, 0x5, 0x4e, 0x1}) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) [ 1780.165503][T11063] CPU: 1 PID: 11063 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1780.174634][T11063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1780.185548][T11063] Call Trace: [ 1780.189596][T11063] dump_stack+0x172/0x1f0 [ 1780.193926][T11063] should_fail.cold+0xa/0x15 [ 1780.198708][T11063] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1780.204538][T11063] ? ___might_sleep+0x163/0x280 [ 1780.209394][T11063] __should_failslab+0x121/0x190 [ 1780.214349][T11063] should_failslab+0x9/0x14 [ 1780.219066][T11063] kmem_cache_alloc_trace+0x2d1/0x760 [ 1780.224533][T11063] jfs_fill_super+0xb4/0xba0 [ 1780.229137][T11063] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1780.234321][T11063] ? wait_for_completion+0x440/0x440 [ 1780.239616][T11063] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1780.245330][T11063] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1780.252257][T11063] mount_bdev+0x307/0x3c0 [ 1780.257199][T11063] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1780.262403][T11063] jfs_do_mount+0x35/0x40 [ 1780.267010][T11063] ? jfs_get_dquots+0x20/0x20 [ 1780.271689][T11063] legacy_get_tree+0xf2/0x200 [ 1780.276372][T11063] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1780.282612][T11063] vfs_get_tree+0x123/0x450 [ 1780.287118][T11063] do_mount+0x1436/0x2c40 [ 1780.291441][T11063] ? copy_mount_string+0x40/0x40 [ 1780.296390][T11063] ? _copy_from_user+0xdd/0x150 [ 1780.301270][T11063] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1780.307745][T11063] ? copy_mount_options+0x280/0x3a0 [ 1780.312953][T11063] ksys_mount+0xdb/0x150 [ 1780.317358][T11063] __x64_sys_mount+0xbe/0x150 [ 1780.322025][T11063] do_syscall_64+0x103/0x610 [ 1780.326607][T11063] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1780.332482][T11063] RIP: 0033:0x458209 [ 1780.336381][T11063] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1780.356061][T11063] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 03:52:44 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:52:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRESOCT=r2], 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r3 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x80000001, 0xa4000) ioctl$VIDIOC_DBG_G_CHIP_INFO(r3, 0xc0c85666, &(0x7f0000000580)={{0x4, @addr=0x9}, "7628ff8fb8b11ea2a947a0b9b453eeb8864591f784067114f4b2951baa54d70a"}) ioctl$KVM_SET_PIT(0xffffffffffffffff, 0x8048ae66, 0x0) mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) pread64(0xffffffffffffffff, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x8000, 0x108) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00'}, 0x10) ioctl$VIDIOC_SUBDEV_S_FMT(0xffffffffffffffff, 0xc0585605, &(0x7f00000003c0)={0x1, 0x0, {0xffff, 0x200, 0x3033, 0x0, 0xb, 0x7}}) r4 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) ioctl$KVM_CREATE_PIT2(r4, 0x4040ae77, &(0x7f0000000500)) ioctl$BLKIOOPT(0xffffffffffffffff, 0x1279, &(0x7f0000000040)) r5 = dup2(r2, r4) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r5, 0x6, 0x15, &(0x7f0000000000)=0x200, 0x4) setsockopt$nfc_llcp_NFC_LLCP_RW(r5, 0x118, 0x0, &(0x7f0000000180)=0xfffffffffffffffe, 0x4) setsockopt$IP_VS_SO_SET_EDIT(r5, 0x0, 0x483, &(0x7f0000000140)={0x0, @multicast1, 0x4e24, 0x1, 'fo\x00', 0x12, 0x1, 0x47}, 0x2c) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) [ 1780.364552][T11063] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 [ 1780.372540][T11063] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1780.380528][T11063] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1780.388488][T11063] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1780.396445][T11063] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 03:52:44 executing program 4 (fault-call:1 fault-nth:59): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:44 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000040)=[0x2000000, 0xffffffff]) 03:52:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x101800, 0x0) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f00000000c0)={0x1, 0x5}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={r0}) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f00000000c0)={0x20}, 0x4) 03:52:44 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x2800, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x6, 0x0, [], [{0x6, 0x5, 0x2, 0x4, 0x7fffffff, 0x800}, {0x100000000, 0x6, 0xffffffff, 0x20, 0x40, 0x80000001}], [[], [], [], [], [], []]}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$sock_x25_SIOCADDRT(r1, 0x890b, &(0x7f00000003c0)={@null=' \x00', 0x4, 'rose0\x00\x00\x00\x00\x00\x00\x00Cj\x87$\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00'}) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) [ 1780.740780][T11101] FAULT_INJECTION: forcing a failure. [ 1780.740780][T11101] name failslab, interval 1, probability 0, space 0, times 0 [ 1780.769872][T11101] CPU: 0 PID: 11101 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1780.779002][T11101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1780.779028][T11101] Call Trace: [ 1780.779053][T11101] dump_stack+0x172/0x1f0 [ 1780.779077][T11101] should_fail.cold+0xa/0x15 [ 1780.779101][T11101] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1780.779125][T11101] ? ___might_sleep+0x163/0x280 [ 1780.779146][T11101] __should_failslab+0x121/0x190 [ 1780.779165][T11101] should_failslab+0x9/0x14 [ 1780.779184][T11101] kmem_cache_alloc_trace+0x2d1/0x760 [ 1780.779216][T11101] jfs_fill_super+0xb4/0xba0 [ 1780.807223][T11101] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1780.807241][T11101] ? wait_for_completion+0x440/0x440 [ 1780.807279][T11101] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1780.821537][T11101] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1780.821558][T11101] mount_bdev+0x307/0x3c0 [ 1780.821574][T11101] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1780.821601][T11101] jfs_do_mount+0x35/0x40 [ 1780.831533][T11101] ? jfs_get_dquots+0x20/0x20 [ 1780.831551][T11101] legacy_get_tree+0xf2/0x200 [ 1780.831565][T11101] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1780.831581][T11101] vfs_get_tree+0x123/0x450 [ 1780.831606][T11101] do_mount+0x1436/0x2c40 [ 1780.831627][T11101] ? copy_mount_string+0x40/0x40 [ 1780.831643][T11101] ? _copy_from_user+0xdd/0x150 [ 1780.831661][T11101] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1780.831680][T11101] ? copy_mount_options+0x280/0x3a0 [ 1780.847761][T11101] ksys_mount+0xdb/0x150 [ 1780.847779][T11101] __x64_sys_mount+0xbe/0x150 [ 1780.847799][T11101] do_syscall_64+0x103/0x610 [ 1780.847821][T11101] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1780.847831][T11101] RIP: 0033:0x458209 03:52:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000100)) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000080)={0xfde4, 0x4, 0x0, {0x1, 0x7, 0x1, 0x0, [0x0]}}, 0x29) setsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000140)=0xfffffffffffffff9, 0x4) 03:52:44 executing program 4 (fault-call:1 fault-nth:60): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1780.847846][T11101] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1780.847854][T11101] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1780.858519][T11101] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 [ 1780.858529][T11101] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1780.858537][T11101] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 03:52:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) r2 = fcntl$getown(r0, 0x9) fcntl$setown(r0, 0x8, r2) r3 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$ALG_SET_AEAD_AUTHSIZE(r3, 0x117, 0x5, 0x0, 0xffffffffb773fb7d) [ 1780.858546][T11101] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1780.858554][T11101] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 03:52:44 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0xd0482, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000040)=0xe8) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@mcast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) r5 = getegid() stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)=0x0) getgroups(0x2, &(0x7f0000000740)=[0xee01, 0xee01]) write$FUSE_DIRENTPLUS(r1, &(0x7f0000000780)=ANY=[@ANYBLOB="5803000000000000080000000000000004000000000000000300000000000000ff000000000000000700000000000000030000007f0000000400000000000000000000000000000007000000000000009ec60000000000000000000001000000cc5d000000000000094f5d1801040000ffffffff9e03000000000000", @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="ffff0000b200000000000000060000000000000008000000000000000c000000060000002f6465762f6173686d656d00000000000200000000000000000000000000000079ffffffffffffff02000000000000000800000040cb000003000000000000000100000000000000050000000000000001000100000000000400000000000000070000000000000065faffff850000008be0000008000000ffffffff", @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="020000000400000000000000060000000000000007000000000000000c000000010000002f6465762f6173686d656d000000000000000000000000000100000000000000010000000000000037ea000000000000040000000300000001000000000000006a0f00000000000000000100000000004101000000000000040000000000000001000000000000000500000000000000070000000900000001010000", @ANYRES32=r6, @ANYRES32=r7, @ANYBLOB="fbffffff0500000000000000040000000000000018840254000000000c000000000000002f6465762f6173686d656d000000000006000000000000000300000000000000000000000000000080000000000000008100000006003d1e0ce7b22f4b22d5ff16dc0000bd196d7700000000006f00000000000001000000000000000300000000000000214100000000000000000000000000000700000000000080", @ANYRES32=r8, @ANYRES32=r9, @ANYBLOB="040000000400000000000000040000000000000001000000000000000c0000001d0a00002f6465762f6173686d656d000000000003000000000000000200000000000000350e0000000000000900000000000000ffffffff06000000010000000000000006000000000000000800000000000000010000800000000009000000000000001a867d17000000000000010006000000010001000000000003000000", @ANYRES32=r10, @ANYRES32=r11, @ANYBLOB="001000000900000000000000060000000000000081000000000000000c000000ff0f00002f6465762f6173686d656d0000000000"], 0x358) [ 1781.124521][T11120] FAULT_INJECTION: forcing a failure. [ 1781.124521][T11120] name failslab, interval 1, probability 0, space 0, times 0 [ 1781.137967][T11120] CPU: 0 PID: 11120 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1781.147092][T11120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1781.157254][T11120] Call Trace: [ 1781.160567][T11120] dump_stack+0x172/0x1f0 [ 1781.164929][T11120] should_fail.cold+0xa/0x15 [ 1781.165097][T11120] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1781.175659][T11120] __should_failslab+0x121/0x190 [ 1781.175680][T11120] should_failslab+0x9/0x14 [ 1781.175697][T11120] kmem_cache_alloc+0x47/0x6f0 [ 1781.175711][T11120] ? __lock_acquire+0x548/0x3fb0 [ 1781.175735][T11120] xas_alloc+0x2df/0x3d0 [ 1781.175751][T11120] xas_create+0x2cd/0xff0 [ 1781.175774][T11120] xas_store+0x9a/0x19b0 [ 1781.175789][T11120] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1781.175801][T11120] ? xas_start+0x166/0x560 [ 1781.175817][T11120] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1781.175830][T11120] ? xas_load+0x67/0x150 [ 1781.175865][T11120] __add_to_page_cache_locked+0x5b7/0xe70 [ 1781.175888][T11120] ? file_check_and_advance_wb_err+0x3a0/0x3a0 [ 1781.185339][T11120] ? lock_downgrade+0x880/0x880 [ 1781.185355][T11120] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1781.185379][T11120] ? count_shadow_nodes+0x500/0x500 [ 1781.185398][T11120] ? find_get_entry+0x535/0x880 [ 1781.185416][T11120] add_to_page_cache_lru+0x1f1/0x780 [ 1781.185433][T11120] ? add_to_page_cache_locked+0x40/0x40 03:52:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="1588"]) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) set_thread_area(&(0x7f0000000040)={0x2, 0x20001000, 0x1000, 0xff, 0x3, 0x10000, 0xff, 0x2, 0x9, 0xff}) [ 1781.185449][T11120] ? __page_cache_alloc+0x131/0x460 [ 1781.185469][T11120] pagecache_get_page+0x36f/0x770 [ 1781.185490][T11120] __getblk_gfp+0x3c6/0xd30 [ 1781.185516][T11120] __bread_gfp+0x2f/0x300 [ 1781.185537][T11120] readSuper+0xab/0x250 [ 1781.200334][T11120] chkSuper+0xa3/0xcd0 [ 1781.200351][T11120] ? lock_downgrade+0x880/0x880 [ 1781.200365][T11120] ? readSuper+0x250/0x250 [ 1781.200382][T11120] ? kasan_check_read+0x11/0x20 [ 1781.200395][T11120] ? do_raw_spin_unlock+0x57/0x270 [ 1781.200421][T11120] jfs_mount+0x4a/0x3e0 [ 1781.220092][T11120] jfs_fill_super+0x571/0xba0 [ 1781.220110][T11120] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1781.220127][T11120] ? wait_for_completion+0x440/0x440 [ 1781.220150][T11120] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1781.220168][T11120] mount_bdev+0x307/0x3c0 [ 1781.220181][T11120] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1781.220199][T11120] jfs_do_mount+0x35/0x40 [ 1781.220215][T11120] ? jfs_get_dquots+0x20/0x20 [ 1781.220232][T11120] legacy_get_tree+0xf2/0x200 [ 1781.220246][T11120] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1781.220260][T11120] vfs_get_tree+0x123/0x450 [ 1781.220275][T11120] do_mount+0x1436/0x2c40 [ 1781.220295][T11120] ? copy_mount_string+0x40/0x40 [ 1781.274884][T11120] ? _copy_from_user+0xdd/0x150 [ 1781.308141][T11120] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1781.308158][T11120] ? copy_mount_options+0x280/0x3a0 [ 1781.308177][T11120] ksys_mount+0xdb/0x150 [ 1781.308192][T11120] __x64_sys_mount+0xbe/0x150 [ 1781.308211][T11120] do_syscall_64+0x103/0x610 [ 1781.308234][T11120] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1781.308246][T11120] RIP: 0033:0x458209 [ 1781.308261][T11120] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1781.308269][T11120] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1781.308291][T11120] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 [ 1781.326980][T11120] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1781.326989][T11120] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1781.326998][T11120] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1781.327007][T11120] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 [ 1781.356055][ T2489] block nbd4: Attempted send on invalid socket [ 1781.388743][ T2489] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1781.398563][ T2489] block nbd4: Attempted send on invalid socket [ 1781.413605][ T2489] print_req_error: I/O error, dev nbd4, sector 120 flags 0 [ 1782.457845][ C1] net_ratelimit: 16 callbacks suppressed [ 1782.457851][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1782.469462][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1782.617900][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1782.623765][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1782.629839][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1782.635648][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1782.641546][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1782.647322][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1782.653265][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1782.659164][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:52:47 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:52:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000140)={{0x3a, @rand_addr=0x7, 0x4e23, 0x3, 'rr\x00', 0x18, 0x100000001, 0x72}, {@rand_addr=0x1, 0x4e24, 0x2004, 0x6, 0x20, 0x5e06}}, 0x44) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:47 executing program 4 (fault-call:1 fault-nth:61): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:47 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:52:47 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x4, &(0x7f0000000040)=[{0x7, 0x7, 0x8e, 0x6}, {0x3f, 0x1, 0x80}, {0x800, 0x9}, {0x2, 0xeef7, 0x510, 0x800}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000140)=0x4, 0x4) ioctl$TIOCGPTPEER(r0, 0x5441, 0x7f) [ 1783.530151][T11143] FAULT_INJECTION: forcing a failure. [ 1783.530151][T11143] name failslab, interval 1, probability 0, space 0, times 0 [ 1783.542824][T11143] CPU: 1 PID: 11143 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1783.551915][T11143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1783.562010][T11143] Call Trace: [ 1783.565295][T11143] dump_stack+0x172/0x1f0 [ 1783.569635][T11143] should_fail.cold+0xa/0x15 [ 1783.574245][T11143] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1783.580064][T11143] __should_failslab+0x121/0x190 [ 1783.585010][T11143] should_failslab+0x9/0x14 [ 1783.589520][T11143] kmem_cache_alloc+0x47/0x6f0 [ 1783.594562][T11143] ? __lock_acquire+0x548/0x3fb0 [ 1783.599528][T11143] xas_alloc+0x2df/0x3d0 [ 1783.603772][T11143] xas_create+0x2cd/0xff0 [ 1783.608104][T11143] xas_store+0x9a/0x19b0 [ 1783.612346][T11143] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1783.618606][T11143] ? xas_start+0x166/0x560 [ 1783.623029][T11143] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1783.629293][T11143] ? xas_load+0x67/0x150 [ 1783.633547][T11143] __add_to_page_cache_locked+0x5b7/0xe70 [ 1783.639273][T11143] ? file_check_and_advance_wb_err+0x3a0/0x3a0 [ 1783.645422][T11143] ? lock_downgrade+0x880/0x880 [ 1783.650266][T11143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1783.656628][T11143] ? count_shadow_nodes+0x500/0x500 [ 1783.661819][T11143] ? find_get_entry+0x535/0x880 [ 1783.666676][T11143] add_to_page_cache_lru+0x1f1/0x780 [ 1783.672082][T11143] ? add_to_page_cache_locked+0x40/0x40 [ 1783.677654][T11143] ? __page_cache_alloc+0x131/0x460 [ 1783.682861][T11143] pagecache_get_page+0x36f/0x770 [ 1783.687907][T11143] __getblk_gfp+0x3c6/0xd30 [ 1783.692405][T11143] __bread_gfp+0x2f/0x300 [ 1783.696732][T11143] readSuper+0xab/0x250 [ 1783.700891][T11143] chkSuper+0xa3/0xcd0 [ 1783.704958][T11143] ? lock_downgrade+0x880/0x880 [ 1783.709890][T11143] ? readSuper+0x250/0x250 [ 1783.714310][T11143] ? kasan_check_read+0x11/0x20 [ 1783.719440][T11143] ? do_raw_spin_unlock+0x57/0x270 [ 1783.724559][T11143] jfs_mount+0x4a/0x3e0 [ 1783.728746][T11143] jfs_fill_super+0x571/0xba0 [ 1783.733448][T11143] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1783.738635][T11143] ? wait_for_completion+0x440/0x440 [ 1783.743914][T11143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1783.750158][T11143] mount_bdev+0x307/0x3c0 [ 1783.754492][T11143] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1783.759606][T11143] jfs_do_mount+0x35/0x40 [ 1783.763959][T11143] ? jfs_get_dquots+0x20/0x20 [ 1783.768648][T11143] legacy_get_tree+0xf2/0x200 [ 1783.773339][T11143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1783.779599][T11143] vfs_get_tree+0x123/0x450 [ 1783.784135][T11143] do_mount+0x1436/0x2c40 [ 1783.788467][T11143] ? copy_mount_string+0x40/0x40 [ 1783.793408][T11143] ? _copy_from_user+0xdd/0x150 [ 1783.798281][T11143] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1783.804721][T11143] ? copy_mount_options+0x280/0x3a0 [ 1783.809929][T11143] ksys_mount+0xdb/0x150 [ 1783.814173][T11143] __x64_sys_mount+0xbe/0x150 [ 1783.818859][T11143] do_syscall_64+0x103/0x610 [ 1783.823441][T11143] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1783.829327][T11143] RIP: 0033:0x458209 [ 1783.833216][T11143] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1783.852831][T11143] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1783.861246][T11143] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 [ 1783.869223][T11143] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1783.877291][T11143] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1783.885269][T11143] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1783.893323][T11143] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 [ 1783.904692][ T2490] block nbd4: Attempted send on invalid socket [ 1783.911031][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1783.918912][ T2490] block nbd4: Attempted send on invalid socket [ 1783.925468][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 [ 1783.948981][T11144] IPVS: set_ctl: invalid protocol: 58 0.0.0.7:20003 03:52:47 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x1, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x68, r2, 0x101, 0x70bd2a, 0x25dfdbfc, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x1f, @media='udp\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x800) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x40000, 0x0) write$FUSE_POLL(r3, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x8, {0x3}}, 0x18) 03:52:47 executing program 4 (fault-call:1 fault-nth:62): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x3, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="2900000004000000000000000000000001000000000040000000000000000000010000000000000000738bc853db4933a7ceccc8"], 0x29) 03:52:47 executing program 5 (fault-call:8 fault-nth:0): pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:52:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) [ 1784.126332][T11162] FAULT_INJECTION: forcing a failure. [ 1784.126332][T11162] name failslab, interval 1, probability 0, space 0, times 0 [ 1784.153965][T11162] CPU: 1 PID: 11162 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1784.163288][T11162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1784.163296][T11162] Call Trace: [ 1784.163336][T11162] dump_stack+0x172/0x1f0 [ 1784.163360][T11162] should_fail.cold+0xa/0x15 [ 1784.163381][T11162] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1784.163400][T11162] ? find_get_entry+0x50e/0x880 [ 1784.163426][T11162] __should_failslab+0x121/0x190 [ 1784.186488][T11162] should_failslab+0x9/0x14 [ 1784.186505][T11162] kmem_cache_alloc+0x47/0x6f0 [ 1784.186522][T11162] ? ___might_sleep+0x163/0x280 [ 1784.186549][T11162] ? mempool_alloc+0x380/0x380 [ 1784.199027][T11162] mempool_alloc_slab+0x47/0x60 [ 1784.199045][T11162] mempool_alloc+0x16b/0x380 [ 1784.199067][T11162] ? mempool_destroy+0x40/0x40 [ 1784.199082][T11162] ? mark_held_locks+0xa4/0xf0 [ 1784.199101][T11162] ? lock_downgrade+0x880/0x880 [ 1784.199116][T11162] ? __find_get_block+0x9ba/0xcf0 [ 1784.199136][T11162] ? __getblk_gfp+0x2c8/0xd30 [ 1784.257892][T11162] ? __find_get_block+0x9ba/0xcf0 [ 1784.268045][T11162] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1784.273414][T11162] bio_alloc_bioset+0x3bf/0x680 [ 1784.278352][T11162] ? __find_get_block+0x317/0xcf0 [ 1784.283389][T11162] ? bvec_alloc+0x2f0/0x2f0 [ 1784.288012][T11162] submit_bh_wbc+0x133/0x7f0 [ 1784.292625][T11162] __bread_gfp+0x13d/0x300 [ 1784.297059][T11162] readSuper+0xab/0x250 [ 1784.301254][T11162] chkSuper+0xa3/0xcd0 [ 1784.305322][T11162] ? lock_downgrade+0x880/0x880 [ 1784.310160][T11162] ? readSuper+0x250/0x250 [ 1784.314565][T11162] ? kasan_check_read+0x11/0x20 [ 1784.319403][T11162] ? do_raw_spin_unlock+0x57/0x270 [ 1784.324501][T11162] jfs_mount+0x4a/0x3e0 [ 1784.328661][T11162] jfs_fill_super+0x571/0xba0 [ 1784.333353][T11162] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1784.338541][T11162] ? wait_for_completion+0x440/0x440 [ 1784.343828][T11162] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1784.350058][T11162] mount_bdev+0x307/0x3c0 [ 1784.354375][T11162] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1784.359564][T11162] jfs_do_mount+0x35/0x40 [ 1784.363890][T11162] ? jfs_get_dquots+0x20/0x20 [ 1784.368554][T11162] legacy_get_tree+0xf2/0x200 [ 1784.373223][T11162] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1784.379467][T11162] vfs_get_tree+0x123/0x450 [ 1784.384071][T11162] do_mount+0x1436/0x2c40 [ 1784.388407][T11162] ? copy_mount_string+0x40/0x40 [ 1784.393358][T11162] ? _copy_from_user+0xdd/0x150 [ 1784.398199][T11162] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1784.404425][T11162] ? copy_mount_options+0x280/0x3a0 [ 1784.409622][T11162] ksys_mount+0xdb/0x150 [ 1784.413965][T11162] __x64_sys_mount+0xbe/0x150 [ 1784.418645][T11162] do_syscall_64+0x103/0x610 [ 1784.423227][T11162] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1784.429118][T11162] RIP: 0033:0x458209 [ 1784.433002][T11162] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1784.452593][T11162] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1784.460994][T11162] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 [ 1784.469274][T11162] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1784.477320][T11162] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1784.485278][T11162] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1784.493234][T11162] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 [ 1784.508060][ T2490] block nbd4: Attempted send on invalid socket [ 1784.515178][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 03:52:48 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x5, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) [ 1784.524396][ T2490] block nbd4: Attempted send on invalid socket [ 1784.531030][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:52:50 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:52:50 executing program 4 (fault-call:1 fault-nth:63): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x7, 0x10002) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r1, 0xc040564a, &(0x7f00000000c0)={0x0, 0x0, 0x301f, 0x80000000, 0x4, 0x6, 0x7fff, 0x1}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:50 executing program 3: r0 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000180)=0x60) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x3) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x400, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='pids\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000040)=0x91b36a2b52b22c8) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:52:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x80200) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x6) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000080)=ANY=[@ANYBLOB=')\x00\x00\x00\x00\x00\x00\x00\x00!\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0x29) 03:52:50 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) [ 1786.609598][ T2490] block nbd4: Attempted send on invalid socket [ 1786.616527][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1786.626807][T11191] FAULT_INJECTION: forcing a failure. [ 1786.626807][T11191] name failslab, interval 1, probability 0, space 0, times 0 03:52:50 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x400000) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:52:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x42000, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r2, 0x110, 0x5, &(0x7f00000000c0)=[0x4], 0x2) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) [ 1786.658325][T11191] CPU: 1 PID: 11191 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1786.667463][T11191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1786.677532][T11191] Call Trace: [ 1786.680869][T11191] dump_stack+0x172/0x1f0 [ 1786.685233][T11191] should_fail.cold+0xa/0x15 [ 1786.689949][T11191] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1786.695789][T11191] ? find_get_entry+0x50e/0x880 [ 1786.700668][T11191] __should_failslab+0x121/0x190 [ 1786.705625][T11191] should_failslab+0x9/0x14 [ 1786.710143][T11191] kmem_cache_alloc+0x47/0x6f0 [ 1786.714949][T11191] ? ___might_sleep+0x163/0x280 [ 1786.714971][T11191] ? mempool_alloc+0x380/0x380 [ 1786.714993][T11191] mempool_alloc_slab+0x47/0x60 [ 1786.724627][T11191] mempool_alloc+0x16b/0x380 [ 1786.724652][T11191] ? mempool_destroy+0x40/0x40 [ 1786.724669][T11191] ? mark_held_locks+0xa4/0xf0 [ 1786.724682][T11191] ? lock_downgrade+0x880/0x880 [ 1786.724703][T11191] ? __find_get_block+0x9ba/0xcf0 [ 1786.754429][T11191] ? __getblk_gfp+0x2c8/0xd30 [ 1786.759102][T11191] ? __find_get_block+0x9ba/0xcf0 [ 1786.764404][T11191] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1786.769697][T11191] bio_alloc_bioset+0x3bf/0x680 [ 1786.774651][T11191] ? __find_get_block+0x317/0xcf0 [ 1786.780232][T11191] ? bvec_alloc+0x2f0/0x2f0 [ 1786.784756][T11191] submit_bh_wbc+0x133/0x7f0 [ 1786.789436][T11191] __bread_gfp+0x13d/0x300 [ 1786.793875][T11191] readSuper+0x16e/0x250 [ 1786.798117][T11191] chkSuper+0xa3/0xcd0 [ 1786.802187][T11191] ? lock_downgrade+0x880/0x880 [ 1786.807141][T11191] ? readSuper+0x250/0x250 [ 1786.811584][T11191] ? kasan_check_read+0x11/0x20 [ 1786.816457][T11191] ? do_raw_spin_unlock+0x57/0x270 [ 1786.821590][T11191] jfs_mount+0x4a/0x3e0 [ 1786.825843][T11191] jfs_fill_super+0x571/0xba0 [ 1786.830504][T11191] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1786.835605][T11191] ? wait_for_completion+0x440/0x440 [ 1786.840973][T11191] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1786.847223][T11191] mount_bdev+0x307/0x3c0 [ 1786.851574][T11191] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1786.856869][T11191] jfs_do_mount+0x35/0x40 [ 1786.868890][T11191] ? jfs_get_dquots+0x20/0x20 [ 1786.873917][T11191] legacy_get_tree+0xf2/0x200 [ 1786.878594][T11191] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1786.884912][T11191] vfs_get_tree+0x123/0x450 [ 1786.889409][T11191] do_mount+0x1436/0x2c40 [ 1786.893747][T11191] ? copy_mount_string+0x40/0x40 [ 1786.898676][T11191] ? _copy_from_user+0xdd/0x150 [ 1786.904580][T11191] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1786.910942][T11191] ? copy_mount_options+0x280/0x3a0 [ 1786.916141][T11191] ksys_mount+0xdb/0x150 [ 1786.920393][T11191] __x64_sys_mount+0xbe/0x150 [ 1786.925085][T11191] do_syscall_64+0x103/0x610 [ 1786.929866][T11191] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1786.935755][T11191] RIP: 0033:0x458209 [ 1786.939835][T11191] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:52:50 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1786.959645][T11191] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1786.968074][T11191] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 [ 1786.976075][T11191] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1786.984562][T11191] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1786.992658][T11191] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1787.000654][T11191] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 03:52:50 executing program 4 (fault-call:1 fault-nth:64): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1787.011608][ T2490] block nbd4: Attempted send on invalid socket [ 1787.018149][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:52:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x14000, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000180)=0x10) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="762188", @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000040)) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f00000001c0)={{0xa, 0x4e21, 0x9, @loopback, 0x1}, {0xa, 0x4e21, 0x6, @local, 0x4}, 0x7f, [0xff, 0x6, 0x3f11, 0x6, 0xcb33, 0x4, 0x1, 0x400]}, 0x5c) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:50 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$KVM_SET_SREGS(r1, 0x4138ae84, &(0x7f00000000c0)={{0x2, 0x2, 0x8, 0x4, 0x0, 0x1f, 0x7f, 0x6, 0x8, 0x1, 0x7f, 0x800}, {0xd000, 0x0, 0x0, 0x9a, 0x80000001, 0x85, 0x80000001, 0x6, 0x8, 0x4, 0xfffffffffffffff8, 0xd031}, {0x4000, 0x6000, 0xd, 0x81, 0x7, 0x1, 0x8, 0xffff, 0x5, 0x8, 0x8001, 0x1ff}, {0xf000, 0x0, 0xd, 0x101, 0x9, 0x6, 0x5, 0x9, 0x0, 0x2, 0x10001, 0x9}, {0x5000, 0x102004, 0xb, 0x7fffffff, 0xfff, 0x7, 0x9, 0x8, 0x3ff, 0x1ff, 0x3f, 0x8}, {0x5000, 0x4, 0xa, 0x100, 0x8, 0x5, 0xe8, 0xffffffffffff0833, 0xffff, 0x2, 0x80, 0x8}, {0xd000, 0xf000, 0x1f, 0x5, 0x0, 0x6, 0x3, 0xfff, 0x0, 0x6, 0x6, 0x4}, {0x1, 0x0, 0xd, 0x281, 0x5, 0x7, 0x101, 0xfffffffffffffffd, 0x8, 0x3, 0x9, 0x4}, {0xf002}, {0xf000, 0x2001}, 0x40001, 0x0, 0x0, 0x20000, 0x5, 0x2000, 0x6002, [0x8, 0x10000, 0x0, 0x6]}) 03:52:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x29) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x1, 0x0) ioctl$PPPIOCATTACH(r2, 0x4004743d, &(0x7f0000000080)=0x1) [ 1787.218865][ T2489] block nbd4: Attempted send on invalid socket [ 1787.225259][ T2489] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1787.233808][T11216] FAULT_INJECTION: forcing a failure. [ 1787.233808][T11216] name failslab, interval 1, probability 0, space 0, times 0 [ 1787.247597][T11216] CPU: 1 PID: 11216 Comm: syz-executor.4 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1787.256718][T11216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1787.266779][T11216] Call Trace: [ 1787.270078][T11216] dump_stack+0x172/0x1f0 [ 1787.274441][T11216] should_fail.cold+0xa/0x15 [ 1787.279135][T11216] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1787.285057][T11216] ? find_get_entry+0x50e/0x880 [ 1787.289939][T11216] __should_failslab+0x121/0x190 [ 1787.296134][T11216] should_failslab+0x9/0x14 [ 1787.301283][T11216] kmem_cache_alloc+0x47/0x6f0 [ 1787.306054][T11216] ? ___might_sleep+0x163/0x280 [ 1787.310955][T11216] ? mempool_alloc+0x380/0x380 [ 1787.315795][T11216] mempool_alloc_slab+0x47/0x60 [ 1787.320660][T11216] mempool_alloc+0x16b/0x380 [ 1787.325265][T11216] ? mempool_destroy+0x40/0x40 [ 1787.330232][T11216] ? mark_held_locks+0xa4/0xf0 [ 1787.334982][T11216] ? lock_downgrade+0x880/0x880 [ 1787.339917][T11216] ? __find_get_block+0x9ba/0xcf0 [ 1787.344937][T11216] ? __getblk_gfp+0x2c8/0xd30 [ 1787.349621][T11216] ? __find_get_block+0x9ba/0xcf0 [ 1787.354639][T11216] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1787.359927][T11216] bio_alloc_bioset+0x3bf/0x680 03:52:51 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_hci(r1, 0xc00448ff, &(0x7f0000000580)="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") r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) [ 1787.364767][T11216] ? __find_get_block+0x317/0xcf0 [ 1787.369814][T11216] ? bvec_alloc+0x2f0/0x2f0 [ 1787.374317][T11216] submit_bh_wbc+0x133/0x7f0 [ 1787.378902][T11216] __bread_gfp+0x13d/0x300 [ 1787.383304][T11216] readSuper+0x16e/0x250 [ 1787.387561][T11216] chkSuper+0xa3/0xcd0 [ 1787.391633][T11216] ? lock_downgrade+0x880/0x880 [ 1787.396500][T11216] ? readSuper+0x250/0x250 [ 1787.400925][T11216] ? kasan_check_read+0x11/0x20 [ 1787.405816][T11216] ? do_raw_spin_unlock+0x57/0x270 [ 1787.410954][T11216] jfs_mount+0x4a/0x3e0 [ 1787.415172][T11216] jfs_fill_super+0x571/0xba0 [ 1787.419892][T11216] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1787.424991][T11216] ? wait_for_completion+0x440/0x440 [ 1787.430263][T11216] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1787.436500][T11216] mount_bdev+0x307/0x3c0 [ 1787.440849][T11216] ? jfs_destroy_inode+0x1e0/0x1e0 [ 1787.445948][T11216] jfs_do_mount+0x35/0x40 [ 1787.450274][T11216] ? jfs_get_dquots+0x20/0x20 [ 1787.455046][T11216] legacy_get_tree+0xf2/0x200 [ 1787.459710][T11216] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1787.465933][T11216] vfs_get_tree+0x123/0x450 [ 1787.470421][T11216] do_mount+0x1436/0x2c40 [ 1787.474913][T11216] ? copy_mount_string+0x40/0x40 [ 1787.479860][T11216] ? _copy_from_user+0xdd/0x150 [ 1787.484840][T11216] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1787.491082][T11216] ? copy_mount_options+0x280/0x3a0 [ 1787.496682][T11216] ksys_mount+0xdb/0x150 [ 1787.500944][T11216] __x64_sys_mount+0xbe/0x150 [ 1787.505627][T11216] do_syscall_64+0x103/0x610 [ 1787.510242][T11216] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1787.516174][T11216] RIP: 0033:0x458209 [ 1787.521168][T11216] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1787.540907][T11216] RSP: 002b:00007f20f7567c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1787.549309][T11216] RAX: ffffffffffffffda RBX: 00007f20f7567c90 RCX: 0000000000458209 [ 1787.557290][T11216] RDX: 00000000200005c0 RSI: 0000000020000580 RDI: 0000000020000000 [ 1787.565696][T11216] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1787.573667][T11216] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f75686d4 [ 1787.581821][T11216] R13: 00000000004c3f52 R14: 00000000004d7198 R15: 0000000000000004 [ 1787.592318][ T2490] block nbd4: Attempted send on invalid socket [ 1787.598818][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:52:51 executing program 4 (fault-call:1 fault-nth:65): creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:51 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioperm(0x3, 0x8, 0x7) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:52:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008916, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x20a800, 0x0) r2 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x1d, 0x0) mkdirat(r2, &(0x7f0000000180)='./file0\x00', 0xd0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000140)=0xad, 0x4) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="2995fd00af2ff7050000001babd738d67c14e978af7a0000040000004b878257ae1b83bfeb174ac90e4db7000000004620c2facb1442"], 0x29) 03:52:51 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1787.827608][ T2490] block nbd4: Attempted send on invalid socket [ 1787.834150][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1787.842164][ T2490] block nbd4: Attempted send on invalid socket [ 1787.848652][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:52:51 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) 03:52:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000040)={0xffffffffffffffab, 0x4, 0x0, {0x3, 0x0, 0x2e6}}, 0xfffffffffffffeea) [ 1788.057879][ C1] net_ratelimit: 24 callbacks suppressed [ 1788.057888][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1788.069514][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1788.087022][ T2489] block nbd4: Attempted send on invalid socket [ 1788.093415][ T2489] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1788.103519][ T2489] block nbd4: Attempted send on invalid socket [ 1788.109848][ T2489] print_req_error: I/O error, dev nbd4, sector 120 flags 0 [ 1788.697830][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1788.703621][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1789.097876][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1789.103669][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1789.109542][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1789.115426][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1789.121481][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1789.127335][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:52:53 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'0dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:53 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:52:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fr\n', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r2, 0x111, 0x3, 0x0, 0x4) lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000340)='y\x00', 0x2, 0x3) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'netdevsim0\x00', 0x0}) sendto$packet(r3, &(0x7f00000000c0)="1c8f575a008933bcf4b07d4fd61eb7fd5360897145b3d0e832daf77fefc5e68558b3098e10869dada3b6241b23d958bb82314775a4af2552ac20c9e5a1bf", 0x3e, 0x40, &(0x7f0000000180)={0x11, 0x1b, r4, 0x1, 0x4, 0x6, @remote}, 0x14) ioctl(r2, 0x1000008912, &(0x7f00000002c0)="0adc1f123c123f3188b07065abb60e9146c6f71701459940754d4feb595807dccee76d34d6994f7bc274f5e617f920dcfcb5a2e9bd7e9b38a763f5e1477a1d") syz_open_dev$vcsn(&(0x7f0000000380)='/dev/vcs#\x00', 0x3, 0x40100) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2900000004009f6d081c00000000000000000000010000000001000000000000000000000100000000"], 0x29) 03:52:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) epoll_create1(0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:53 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xffffffffffffff36) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:52:53 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r2, 0x819, 0x70bd2b, 0x25dfdbfe, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x7f, 0x800, 0x0, 0x3}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20040001}, 0x800) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:52:53 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={';dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:53 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40, 0x0) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f0000000040)) 03:52:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x7, 0x200) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:54 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:52:54 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(r3, 0x2) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:52:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2900000004000000000000000000000001000000000000000000000000000000010000000002000000"], 0x29) 03:52:54 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/.ev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:54 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2c0000, 0x0) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f0000000040)={0x5, 0x4, 0x2, 0x80, 0x37d, 0x3}) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:52:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d3030303030303030302b303030303030303034303030302c757365729b5f696459474f120e90bbd02ba976f4a75841e2e8e3dc7f011363becdbcc6e8b4eae75cfc0c6e929201c01086dec5844304bcf68c", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) sendfile(r0, r1, &(0x7f0000000040)=0x49, 0x4) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:54 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffc) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:52:54 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'//ev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) r2 = getegid() getresuid(&(0x7f00000000c0), &(0x7f0000000140), &(0x7f0000000180)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000480)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@dev}}, &(0x7f00000001c0)=0xe8) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x7fffffffd, &(0x7f0000000580)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize'}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xc7}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x9}}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x800}}, {@default_permissions='default_permissions'}]}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000040)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:54 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev0nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1793.257919][ C0] net_ratelimit: 18 callbacks suppressed [ 1793.263634][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1793.269465][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1793.275546][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1793.281401][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1793.287281][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1793.293095][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1793.300276][ C0] protocol 88fb is buggy, dev hsr_slave_0 03:52:57 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:52:57 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = dup2(r0, r0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000180)={r1, &(0x7f0000000000)="26064be60c19eba56adc28fde909fe2c41a7082a0ebc1da01ed25df375cb7134429b5aa039cb06375598eb400dd282eed1861a401460f29a70e58267cd4998e7025f5327e644bff5db4dbd0db3342479314c96dc4f27c2", &(0x7f00000000c0)=""/149}, 0x18) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) [ 1793.306131][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:52:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000240)=0xb37) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) getsockname$netrom(r2, &(0x7f0000000080)={{0x3, @bcast}, [@netrom, @rose, @rose, @null, @null, @rose, @remote, @null]}, &(0x7f0000000200)=0x48) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f6964ebe1f4f6b1d62f298967e6e0884f4348b368d8dfb5051acf4891625110f76c03d978755d7fb636318f0cd0982cdd1f492265b5f0b8472f0443f70bdc7cc8d2c1e9135a551841a485b054840c369de7bfac62ed6a6562f28f08c773600fb2d0307bc08482683affd71d1235061c26064e86084eb0636dec8691d7f38f0703abe554de5c453f4f33de7ca547bf2b010d93ffaba4853b73f4b196dec5d81ac21378b2ea63f3e1", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="2d0000000400000000200000000000000100000000000000000000000000000001000000000000000015cc051184051b2cff96c4ffc285494934f376172bfe482cafeaec88962b32a7b6b2ebb09314b226c89de2c370ce09eeffc7863f73f18639c8634119a5a7a41f6a00efc2fdf92f5b3a1df65c7d2b121a9ca9ba10dd6ae57961fe956cc2bb3a929ca60accb3cb9c0a695cd04e7c8f6c7f8ce894aae8276cd7"], 0xa1) 03:52:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x89a}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000180)={r2}, &(0x7f00000001c0)=0x8) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f0000000240)={r4, r5/1000+10000}, 0x10) 03:52:57 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev;nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:57 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000000)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xc) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) 03:52:57 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'trusted.', 'wlan1\x00'}) 03:52:57 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/.bd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:57 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:52:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x420000, 0x0) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f00000001c0)=""/106) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x6, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x1, 0x40000) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x8001) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:57 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:52:57 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0xc0803, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x401, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000004c0)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000500)={{{@in, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000600)=0xe8) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000700)=0x0) r6 = getuid() fstat(r0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000007c0)={0x0}, &(0x7f0000000800)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@mcast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}}}, &(0x7f0000000940)=0xe8) lstat(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r11 = getpid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000a40)={0x0, 0x0}, &(0x7f0000000a80)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, &(0x7f0000000b00)=0xc) r14 = gettid() stat(&(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000c00), &(0x7f0000000c40)=0x0, &(0x7f0000000c80)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000cc0)=0x0) r18 = geteuid() r19 = getegid() sendmsg$unix(r1, &(0x7f0000000dc0)={&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000100)="e6b44a67538f1e6961d7cabd18aa98630e0540e04a8a588d22b55fd43a85c0010c69f6960609df50c3cca1662cec623ef8ab2ccca2ccb4efca50365bb9021e4dcceed5d8599072d46d109c85f30d8de7343daa0adc0c23583747184f9aa4f2094472", 0x62}, {&(0x7f0000000180)="4ae4807fa74778201baf60253cbfbf134ea1a0eff9d122d1e2f3cf2a77f19c8a79b80830c6ab075e7e0f8e4761e25b130026ad27decfb26c43117f74fe18bb3ab5220ac642dcb1b16863af270c7374fb3ac07de4e29e53fb8b58b7a1bbe25330b33d7ad83dd80f1edaf95a3833f0", 0x6e}, {&(0x7f0000000200)="d6702ef2", 0x4}, {&(0x7f0000000240)="7dec178854893af177da872d822bb2a6281260201553dfb2da8b232658af696188e606b2f691ca3982a5cdef01", 0x2d}, {&(0x7f0000000280)="f2b0a4ed4aedd26dcb1f54552da4d615af7c30253dff5204d28167eb680bfc0337d6419e4a8f001c05d4b32be492b13f856f87a945c31e3ba256cd99d540a94e89a6a59747dc6d18c0652ac7609f666ff238371d61004b9f29d859af5fb1d2e0e53088052262b2344ad6cd933f626a86e9a614764d27d37fc0e8144ed8110004e039af046017e12c31ed0d24d539ebe4753d1f54f064d108f3e6b8888237478248142f9e35553ec2869c2e24b1e8468ed9654db82639b51b0364ce390283bc2558", 0xc1}, {&(0x7f0000000380)="13ef24ef8b547745df752ea8091a062dba21c2f29d45ebd0208dc85fafe5b960203b8c99449fc0cbed7706006336c595458e852c48b6da4be8302ffe4694eabd7580282abb2c0cddcfa25bd06f7d7083d0d745ba6cc4d59f47f423203c90c6ab0bc0225d8b637805a3ee3ce2053df63696b4488ed5e2f9a334b8c15ed1370c37a307", 0x82}], 0x6, &(0x7f0000000d00)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @cred={0x20, 0x1, 0x2, r14, r15, r16}, @cred={0x20, 0x1, 0x2, r17, r18, r19}], 0xc0, 0x20000000}, 0x800) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:52:57 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev//bd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:57 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:52:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x14) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000480)={{{@in=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000240)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x404, &(0x7f0000000580)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@allow_other='allow_other'}], [{@fowner_lt={'fowner<', r5}}, {@func={'func', 0x3d, 'PATH_CHECK'}}, {@permit_directio='permit_directio'}]}}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) mount$9p_rdma(&(0x7f00000002c0)='127.0.0.1\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x0, &(0x7f00000006c0)={'trans=rdma,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@timeout={'timeout', 0x3d, 0x1000000}}, {@rq={'rq', 0x3d, 0x4}}, {@sq={'sq', 0x3d, 0x2}}], [{@dont_hash='dont_hash'}, {@seclabel='seclabel'}, {@euid_gt={'euid>', r5}}, {@fowner_gt={'fowner>', r3}}, {@dont_measure='dont_measure'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@smackfsdef={'smackfsdef', 0x3d, 'permit_directio'}}]}}) 03:52:57 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = dup(r0) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f00000000c0)={0x0, 0x103, 0x1, {0x10000, 0x6, 0x8e3, 0xbb}}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x8401, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r2, 0xc0106418, &(0x7f0000000040)={0x5, 0x4, 0x8, 0x1, 0x0, 0x3ff}) 03:52:57 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000140)={0x0, 0xd8, 0x4, 0x9, 0x5, [{0x7, 0x2, 0x7, 0x0, 0x0, 0x400}, {0x2, 0x1, 0x2f4}, {0x2, 0x7, 0x8000, 0x0, 0x0, 0x82}, {0xffffffff, 0x6, 0x1, 0x0, 0x0, 0x1000}, {0x80000000, 0xfff, 0x100000001, 0x0, 0x0, 0x300c}]}) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x1ff, 0x4000) 03:52:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:57 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:52:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCRSSL2CALL(r2, 0x89e2, &(0x7f00000000c0)=@default) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:57 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nb.', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:57 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40000, 0x0) ioctl$IMGETDEVINFO(r1, 0x80044944, &(0x7f00000000c0)={0x800}) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x5e, 0x101000) 03:52:57 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1794.239079][T11425] Unknown ioctl -2147202748 03:52:58 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nb/', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1794.270014][T11431] Unknown ioctl -2147202748 03:52:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x101000, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000480)={0x0, 0x0, 0x9, 0x0, [], [{0x3f, 0x100000001, 0x3, 0x6, 0x8, 0x80000001}, {0x1, 0x0, 0x8, 0x8, 0x0, 0x8}], [[], [], [], [], [], [], [], [], []]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000040)) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:58 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400001, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x5, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}, 0x1c) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x24b) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) [ 1794.297921][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1794.303791][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:52:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x4000, 0x0) ioctl$PPPIOCSPASS(r2, 0x40107447, &(0x7f00000000c0)={0x9, &(0x7f0000000140)=[{0xad, 0xffffffff, 0x3ff}, {0x7, 0x1, 0x6, 0xfffffffffffffff1}, {0x1, 0xa6b4}, {0x1b18ff5c, 0x6, 0x0, 0x3ff}, {0x6, 0xd2be, 0x7fffffff, 0x103e00000000000}, {0xc0, 0x100, 0x3f, 0x101}, {0x401, 0x1, 0x0, 0xeb35}, {0x7, 0x4, 0xff, 0xffffffffffffffc6}, {0x52, 0xfe6, 0x0, 0x4}]}) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:58 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x2}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:58 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) ioctl$KVM_SMI(r1, 0xaeb7) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) mknodat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x7) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)={0xc8e, 0x8, 0x6, 0xfffffffffffffe00, 0xc, 0xffffffffffffff81, 0x3ff, 0x4, 0x4, 0x10000, 0x80, 0x5}) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:52:58 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:52:58 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) r1 = accept$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f00000000c0)=@req={0x9, 0x4, 0x1, 0xf5af}, 0x10) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:52:58 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000040)='fd'}, 0x30) ptrace$peek(0x1, r0, &(0x7f00000001c0)) creat(&(0x7f0000000140)='./file0\x00', 0x80) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:58 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x3}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r2, 0x800442d2, &(0x7f00000000c0)={0x6, &(0x7f0000000140)=[{}, {0x0, 0x0, 0x0, @local}, {0x0, 0x0, 0x0, @remote}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @broadcast}, {0x0, 0x0, 0x0, @remote}]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:58 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(0x0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 03:52:58 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x5}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:58 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000100)={'veth1_to_bond\x00', 0x1000}) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) accept4$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x1c, 0x80000) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x9) 03:52:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000005c0)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYRESDEC=r0, @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d1ce86bf7ec2609a0ed95145e873512488cbed91344551bf85e896a5083d62d238a7343186ce9bcf10788a14728784defa60670c082453b8a81d578adcac01e4ee2be86baba526a905b94522c05824f366edf60b90249f909f0fbd358868be5ec2da2ae000000", @ANYRESDEC=0x0, @ANYBLOB="ad2f1767726f75705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r2 = dup(r1) ioctl$KVM_X86_SET_MCE(r2, 0x4040ae9e, &(0x7f0000000300)={0x800000000000000, 0x100000, 0x100, 0x1, 0xd}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") geteuid() write$FUSE_POLL(r1, &(0x7f0000000040)={0xffffffbf, 0x86a777c051821537, 0x1, {0x2}}, 0xffffffffffffffad) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000240)='./file0\x00', 0x10001, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000340)="99151ad64f1fecd658983adeb4c5ad89fcf5f1d1d974be9c779d823aa1471ba0a0da922802ff1f20fcba60c8da4786123103dee851acc0accf777a6c0d138f6ef302d572715b2043eb98a1481427e9c3ebc3b28bb99b29e60e7c354ef057d417097646cea8d97861ac96f38e9bd0deb00ffef60934f36390218b45af7f5ba93a08d0d240925752c991166062c7ff52a943f5074b5fd8e1b892f235668d9bf12e083b7cbfebb40a57cdca0afc6abe02e3481e766558419c6995febd78217acb1d45dbeccaa9f748b7fb0f80ecab79777144fe9e18101d50734cda1da2ddd00c906e4f29", 0xe3, 0x8}, {&(0x7f0000000440)="2ea5c23b65f93917ba61ea9b7a7fecd6536b3f0b165047c1c1d97672e19360a2dfcdb1c4205bc38186b3c404bf8eb33aad8b39d4eeb41061a2e71e3821ef54dc08ceba76c0", 0x45, 0x400}], 0x800000, 0x0) 03:52:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id'}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) acct(&(0x7f00000000c0)='./file0\x00') write$FUSE_DIRENT(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0xfe) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x3a1, 0x0, [0x0]}}, 0x29) futimesat(r0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={{0x77359400}}) 03:52:59 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x6}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1795.371787][T11500] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) [ 1795.436022][T11506] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=00000000) 03:52:59 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:52:59 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(0x0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 03:52:59 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x8) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) read$FUSE(r1, &(0x7f00000000c0), 0x1000) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:52:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x0, 0x80800) connect$pptp(r1, &(0x7f00000000c0)={0x18, 0x2, {0x2, @multicast2}}, 0x1e) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:59 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x7}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:52:59 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(0x0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 03:52:59 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x8}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:52:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={0x0, 0x8}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000340)={r2, @in6={{0xa, 0x4e21, 0x4, @ipv4={[], [], @multicast2}, 0xfffffffffffffff7}}}, 0x84) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) sendto$inet(r0, &(0x7f0000000240)="97c98d32a49e409e7d9a548e42cf5aee49bb7b996798a6b5bd5df2562994", 0x1e, 0x408c0, &(0x7f00000002c0)={0x2, 0x4e23, @local}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000140)={0x4, 0x8, 0xfa00, {r4}}, 0x10) 03:52:59 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:52:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="29000104000000000000000000000000010000000000000000eca2a31efff424d6d710a59640497600c002e1244c9969445dc9c68b25f97e691636dbf877ccde3b6b765d4a76ec1a804f2132e30c43dff709c5998d421ec61e2e207f4139362e901f946b0e40000001a57707d12be44d2a04e45bdc35030ad1de208d4a44e84589076057c2cdb594337c893b5375d967f431bf0238e529c65060dbee96e1327422606a2d803aafe68cb748ed32519946c6c567018cc8724a2967f3393f4fa0f36d34a77120c804fb9a81d7c2af0c23cd7f77ce555c833fa4d0f8d1d806748217ae8b"], 0x29) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f0000000240)=0xffffffffffffff77) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000580)=0xc) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x800, &(0x7f0000000700)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000140000,user_id=', @ANYRESDEC=r2, @ANYBLOB="2c67726f75705f69643d022cbd04b6559a5b4871ec68022239db2ad2b271d0078088ffad70f79021cb0ef76c7c114ff767d02b18f5c0ce3aff8c4d87519969f4bfaeb21ee9403e6c1821a467770d3e3bef69198e202ba68c2c4cb809d62a342f", @ANYRESDEC=r3, @ANYBLOB=',allow_other,obj_role=^,smackfshat=fuse\x00,fowner>', @ANYRESDEC=r4, @ANYBLOB=',fsname=group_id,rootcontext=system_u,\x00']) r5 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x7ffffffd, 0x2000) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f00000000c0)={0x2, 0xffffffff00000001, 0x5, 0x1, 0x8, 0x0, 0x7a, 0xb2cb, 0x0}, &(0x7f00000006c0)=0x20) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r5, 0x84, 0x79, &(0x7f0000000180)={r6, 0x547, 0x80000001}, 0x8) 03:53:00 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x9}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:00 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0xffffffffffffff1f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:00 executing program 2: r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:00 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x1, 0x11, r0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x412000, 0x0) 03:53:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0xfef5, 0x4, 0x0, {0x3, 0x0, 0x0, 0x0, [0x0]}}, 0x29) 03:53:00 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xa}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:00 executing program 2: r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:00 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x10002, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0xffffffffffffffdd, 0x11, r0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000180)={0x5, 0x87, 0x4, 0xa7, 0x2}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x321000, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f00000000c0)={'bond_slave_0\x00', {0x2, 0x4e24, @rand_addr=0x10001}}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x0, 0xb}}, 0xfffffffffffffe90) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x4, @empty, 0xfeeb}, {0xa, 0x4e23, 0x80000000, @mcast2, 0x9}, r2, 0x8}}, 0x48) 03:53:00 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x10}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) r2 = accept$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x14) accept4$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14, 0x800) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:53:00 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x88002, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000080)=0x287) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f00000001c0)={0x0, 0x0, 0x3}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="00000000040000000000", @ANYRESDEC=0x0, @ANYBLOB='l\x00']) ioctl(0xffffffffffffffff, 0x1000008911, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="2900000004000004000000000000000001004000dfffffffffffffff000000ff01000000000000000084116d53dfb8d0c572da98f47ce38c17cb8fc0ac9701317a04919b041f209ba3fc89f51163ca983e049b71a3e9a9b9a4fe5504"], 0x29) socket$inet_dccp(0x2, 0x6, 0x0) 03:53:00 executing program 2: r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:00 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x23}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:01 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x44000, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0xfffffffffffffe9f) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000140)={'filter\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f0000000080)=[{}, {}, {}, {}], 0x0, [{}, {}]}, 0x98) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:01 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r1, 0xc0285629, &(0x7f0000000140)={0x0, 0x12c4, 0x0, [], &(0x7f0000000100)=0x5}) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) lookup_dcookie(0x6, &(0x7f0000000000)=""/79, 0x4f) 03:53:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:53:01 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:01 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xf0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x408000, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, r2, 0x0, 0x70bd2c, 0x25dfdbff, {}, [@SEG6_ATTR_DST={0x14, 0x1, @rand_addr="58c00a17472371c3bba06e3ce35d1231"}, @SEG6_ATTR_SECRET={0x8, 0x4, [0x9]}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x1) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x8, 0x10, r0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="3f00000004000000000000000000000001000000000000000000000040000000010000000000000000"], 0x29) 03:53:01 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x7f) 03:53:01 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0xe003) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f00000000c0)={0x0, 0x7f}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f00000001c0)={r3, 0x1b, "6f43607398b00b924b6967f3a8352e87085fb62ff67ea6a2a5ce46"}, &(0x7f0000000200)=0x23) ioctl(r1, 0x439, &(0x7f0000000340)="0adc3e9e2063e3a5c457a3212d6b0a57074fd1f712c3c14f8db71506b65a86d4ce335fe36ca6c193dbf38cbe48f309c51fcec91ed2fe4bf74bcb95129c4b6fd058fedf7adeda48868e070a907f2fc092bfb58ea299797dcca020b36af23286ca38341287a6e18ad01e961a2a4254d07b6538d056c1de51c7e6371cd78a23501469d02fd983bbcfd1dba9ea673bc5a74a8c59") write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:53:01 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x300}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:01 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{}, {0x0}, {}]}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f00000000c0)={r3, 0x3}) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000340)='/dev/vcsa#\x00', 0x6, 0x2) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000380)={0x1fffffffc000000, 0x1, 0xffff, 0x14, 0xffff}, 0xc) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:53:01 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:01 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x2, 0x0) socket$alg(0x26, 0x5, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f00000001c0)) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) accept$netrom(r1, &(0x7f0000000000)={{0x3, @netrom}, [@null, @bcast, @default, @default, @rose, @netrom, @remote, @null]}, &(0x7f00000000c0)=0x48) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x4000) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000140)={0x1, 0x5, [@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @local, @broadcast, @random="4996dc7a1750"]}) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) 03:53:01 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x500}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1798.106840][ T2490] block nbd4: Attempted send on invalid socket [ 1798.113414][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1798.123561][ T2489] block nbd4: Attempted send on invalid socket [ 1798.129918][ T2489] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:53:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) getresgid(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000140)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0xfffffffffffffffd, 0x0, 0x1, 0x0, [0x0]}}, 0x8) lremovexattr(&(0x7f0000000180)='.\x00', &(0x7f00000001c0)=@known='trusted.overlay.impure\x00') 03:53:02 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:02 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x600}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1798.266504][ T2489] block nbd4: Attempted send on invalid socket [ 1798.272849][ T2489] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1798.288742][ T2490] block nbd4: Attempted send on invalid socket [ 1798.295699][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:53:02 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x9, 0x101000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000080)={'bcsf0\x00', 0x0}) connect$packet(r0, &(0x7f00000000c0)={0x11, 0xf8, r1, 0x1, 0xfffffffffffffffd, 0x6, @local}, 0x14) r2 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000140)=@int=0xfff, 0x4) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="2900000004000000000000000000000001000000000000020000000000000000010000000000000000596ee7b176e1c4f359d328c059506cae4279fc9e074bc87154d771a05084afec9e1882a43c7a81389d6b9ecbee6c47042d1ae61c419eb70bb5ba89fd96d712291a46e1e15e400d7eb93cce2ee2c61d6085718cfbec35c151089f676dfb1b9b523707273598264f4b9f03f5590fc846344ccd15e2c006604bbf27c64d1b0d928e4bd28f27589528b6107b4fc157e91a64854cd9300a0d5e95365ec56fd9a9d2ffbec70f306ab089cd5dfe65f40e6bd874f2e41e8db5f9e35658c4bba0ba4b483d3e616df1d27707cda0e087"], 0x29) [ 1798.421345][ T2489] block nbd4: Attempted send on invalid socket [ 1798.427659][ T2489] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1798.446316][ T2489] block nbd4: Attempted send on invalid socket [ 1798.452839][ T2489] print_req_error: I/O error, dev nbd4, sector 120 flags 0 [ 1798.460394][ C1] net_ratelimit: 22 callbacks suppressed 03:53:02 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r1, &(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x80) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x2000)=nil, 0x2000, 0x20000000, 0x1e, r0, 0x0) [ 1798.460403][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1798.460465][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:53:02 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x700}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:02 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1798.689088][ T2489] block nbd4: Attempted send on invalid socket [ 1798.696426][ T2489] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1798.705975][ T2490] block nbd4: Attempted send on invalid socket [ 1798.713343][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:53:02 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x80000000, 0xb) 03:53:02 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f0000702000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:53:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000040)=0x0) tkill(r2, 0x30) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getegid() ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:53:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x841000, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',id=\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:53:02 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:02 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x900}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1798.990908][ T2490] block nbd4: Attempted send on invalid socket [ 1798.997277][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1799.005212][ T2490] block nbd4: Attempted send on invalid socket [ 1799.011818][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:53:02 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:02 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xa00}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:02 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x1a2) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0x4}) sendmsg$nl_crypto(r1, &(0x7f0000000240)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB="e0000000150000072abd7000fcdbdf257467723136300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040125372dfcaae0359411516c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000"], 0xe0}, 0x1, 0x0, 0x0, 0x4040010}, 0x8000) 03:53:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c80"]) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0xd, 0x4, 0x0, {0x4001, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:53:02 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) socket$pptp(0x18, 0x1, 0x2) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = geteuid() r2 = getegid() mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x200}}, {@max_read={'max_read', 0x3d, 0x4bbdb2fd}}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@fsuuid={'fsuuid', 0x3d, {[0x33, 0x63, 0x36, 0x7f, 0x77, 0x79, 0x67, 0x77], 0x2d, [0x65, 0x31, 0x31, 0x34], 0x2d, [0x62, 0x66, 0x39, 0x36], 0x2d, [0x34, 0x0, 0x62, 0x33], 0x2d, [0x33, 0x36, 0x31, 0x37, 0x0, 0x36, 0x0, 0x74]}}}, {@smackfsroot={'smackfsroot', 0x3d, '['}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}}) ioctl(r0, 0x3, &(0x7f0000000340)="0adc1f123c123f3188b07f40bc1de91c87ac7ddcf3914a92637bc1c3caa6b925b5177d75411165a9596f60fba48d5b7456feeb5e3e49894ffc41177a25e9cc69b251e6528eda32e79d592063398abdd2f0b58ccfda3907c92148b775df28374cfe883d550663a5f87ce5e726c963e9b4f692ea57aab8759ca3ad2d7c42d87e69589ec7e145a0133c86db488502bea04ab6b9f1f825de") write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000680)=ANY=[@ANYBLOB="290000000400000000000000000000000100080000000000000000000000000001000000000000000000e3e28d0a6bf2b344e74f07b8d94a51b282f24bf37d7a043bc7e1aa9673dae48b5c927f3d8997e2a8ac8b25d1a5d3ffdce9d6789f929d0b262f85ddedbc"], 0x29) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x1, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000000640)={0x3, &(0x7f0000000480)=[{}, {}, {}]}) [ 1799.097836][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1799.103720][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:53:03 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x1020}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1799.497883][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1799.503778][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1799.509693][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1799.515475][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1799.521434][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1799.527206][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:53:03 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:03 executing program 3: r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x1, 0x321000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000040)=0x3f) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:53:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x7, 0x91fff) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f00000000c0)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_GEM_CLOSE(r1, 0x40086409, &(0x7f0000000140)={r2}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x8001, 0x882) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000001c0)=@assoc_value={0x0, 0xffff}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r4, 0x84, 0x17, &(0x7f0000000480)={r5, 0x1ff, 0xec, "754c4ff297feec237e194bc0fbc0c3d4842a42a3ab433371b1de8273c8c9bfc493a3a2889c2997f114eeb78c196e269607942a624c347819872cc4556dfbfa59510a5cbe577ae96e6dc7004f20213e1d7a23d249610b3eeb33131a450a5393680f30260853d83eec007a92b572a202a4b259e7d1d82308b7ee2cf9c993dd39d7e58dfe0b8f1a4e4e1253894df05154b431b14a477ea66aa67486a0700975de3cc3dab3a6e8aae075c37a1014a253c28eb04b7932acd62834cc10231dd17bc965a5994e24412b2229f260dc1bfd8f318ebeb968032ad0ba758fcb42db7f27b3c8df7aa7f594dd8b2ae07d4897"}, 0xf4) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$DRM_IOCTL_ADD_MAP(r4, 0xc0286415, &(0x7f0000000580)={&(0x7f0000fff000/0x1000)=nil, 0x2, 0x6, 0x8, &(0x7f0000ffd000/0x3000)=nil, 0xffff}) ioctl(r3, 0x2, &(0x7f0000000340)="7852c51b700adc1f7391e22e3c123f3188b070d70c29b82926c4d0e61188032778adc5219177177fdb5e4a3b55bdc2000000000000000000000000960a56cbe7684924170b8fbfada7d71202ffe522449c058589ff4442f2574a572e1cfc0e38ae2d446e49565e0bbac2a720abf3bd92d66c8e53ca3d21abfbc29c72bc312aa5ce478edf2518a9bea1e02791a0e9e372e43b9582ee36480ac60952f91e8df01feb55b957d7052739c2899271983e05b212f246") write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) socket$xdp(0x2c, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000000240)={r5, 0x3}, &(0x7f00000002c0)=0x8) 03:53:03 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r3, 0x0, 0x810003, 0xb) 03:53:03 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x2000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:03 executing program 1: setxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=@md5={0x1, "8977a28bd2b3c6bb02f3e520425039c6"}, 0x11, 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x46001, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x3f, 0x4, 0x7}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000180)={r2, 0x9, 0x800}, 0x8) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB="6c726f6f746d6f64653d303030303030303034303030302c0000008fc4700582c3fcb65b3d8b551ff587d4cb0ca53c5ed9ca4ba674ae3bc657e8292e1dc61700d70fd530652ee46acf0d32caeab64eba0d744ab09932e04cf5d310a7edaf5e9d7718ad6432b5f37de23771e3b4dd85ac23add3aa06b9a238a41d0f688c0897e640219e40950ceb7f374dec126870a66ab0bee9ea3624ad3054bbd84b5eea61e3d50b47b7e05f7c91d4c828e9942ae5f75aefbb4a35f08f199719f0251523356f3e6315a2aafc552fb2b7733ec468d6b91d3d83b729739e8dd7684a30725471d083fb36a57f9110a3", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_execute_func(&(0x7f00000001c0)="6464f0fe8300008020c4c265bd7479bb0fbc449342c4626598178fc800a3b549000000ca7e85c461605d8f0000000066470f3a21e00046708fc441782b4e1c") getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000340)={'HL\x00'}, &(0x7f0000000380)=0x1e) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="2900ec0004000000000000000000000001000000000000000000000000000000010000000000000000"], 0x29) 03:53:03 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:03 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x2010}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:03 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) r1 = socket$bt_hidp(0x1f, 0x3, 0x6) r2 = dup3(r0, r1, 0x80000) ioctl$DRM_IOCTL_RM_MAP(r2, 0x4028641b, &(0x7f0000000000)={&(0x7f0000700000/0x3000)=nil, 0x80, 0x2, 0x70, &(0x7f0000ffa000/0x4000)=nil}) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x5242) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:53:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:53:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount(&(0x7f0000000040)=@sg0='/dev/sg0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='binfmt_misc\x00', 0xc000, &(0x7f0000000180)='/dev/fuse\x00') ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:53:03 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_user\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f00000000c0)=0x1, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:53:04 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x2300}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:04 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x1) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:53:04 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x20, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x3b}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x40) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:04 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video2\x00', 0x2, 0x0) 03:53:04 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x0, 0x400080) bind$unix(r0, &(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x100000000, 0x0) mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x110010, r2, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:53:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) r2 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) bind$tipc(r2, &(0x7f00000000c0)=@nameseq={0x1e, 0x1, 0x3, {0x43, 0x4, 0x3}}, 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:53:04 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x3f00}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:04 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x181001, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) 03:53:04 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x10000, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r2, 0xc008ae09, &(0x7f0000000140)=""/146) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x7f}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000340)={r3, @in={{0x2, 0x4e22, @remote}}, 0x7fff, 0x2}, 0x90) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:53:04 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x4000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:04 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:53:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2900000004000000000000000000000001000000000000000000000000000900000000000000000000"], 0x29) 03:53:05 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r2 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000000)) splice(r2, 0x0, r0, 0x0, 0x1000000008ac9, 0x8) 03:53:05 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:05 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xedc0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={r0}) ioctl$SIOCX25GCALLUSERDATA(r2, 0x89e4, &(0x7f0000000140)={0x3a, "8a547a41ff8ffd739a76ac39243a08a39326f5bffc85bcd744f139d96caaa0d0f63522dcb6114ee8942727077e655dc98b181daab7641b1b6f0659a68adc08bd14103bffdc54d51550190bbe19258f3e127ceb04733f4867620c42ee7e1fe66d70f9a6fae9736f61397f2b697d5584326589eee718a22db7057ec25327bb1880"}) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x105100, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r3, &(0x7f0000000480)="e7994147dde163428a26c90613b91379330390a6500f1d39e2408358b1e8d84faa7ff6a0c165a2e9ff7e3e06806d7a9f320400602d4121aa4aacb1e8991bd9ae0781c6ddfc452213dbc3037e645ba4e05c2cd1318b2023cdf48af92ccca857135b6d992a235d3ad0aed687e25d872bba24c322091315132bfcb798d503f27140fd5d1710b90a32955a4ddaa053f574c12c94f6e6b3ba4b42db031d437c1626b8bfa14b235a9139a192a47837935648b6d1569ce826ea6afd628ca9849b03a05310a20e876179f92d12d5e9a06495f4c10c2ed28447c624c6231eed10283b8de257e1cd67436155f61e11", &(0x7f0000000340)=""/156}, 0x18) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:53:05 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffa) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:53:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f77aca7020069", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f00000000c0)={0x29, 0x4, 0x0, {0x4, 0x401, 0x248, 0x0, [0x0]}}, 0x29) 03:53:05 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:05 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xf000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x10040, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f00000000c0)=0x2, 0x4) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:53:05 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x200000, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0}, &(0x7f00000006c0)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000700)={{{@in6=@mcast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000800)=0xe8) syz_mount_image$gfs2(&(0x7f0000000340)='gfs2\x00', &(0x7f0000000380)='./file0\x00', 0x5, 0x3, &(0x7f0000000600)=[{&(0x7f00000003c0)="d20f64bfa3d3adaf81b73f2da888cf9576ac8bf422967fc67961c6eeaa53ddfad26fda4c93504ce2edf7f8e4a433b210eed97fc6ec193a61f989ea3f3fec716fbf8fa60826396895af26", 0x4a, 0x1ff}, {&(0x7f0000000440)="b98cc31e569348b6251fbf2e6b7c5b24e85e19811fee22a51e7f7d37117877d0df2064afe2b10313fac66f7802caa2060cadaa9e58b048821fa5f043dafc299742d45d86c6526fdd168d8cb370c5c8a62d54b04630a40ff01ff775dc6215cc9bc32f4ca66a6c0775b599d35ad16cb89d2010e04d8a691013e987f50850e30f3a63d2a60adc0cb0f12f08a5eb87da612902dfc6025f6a76c5a572", 0x9a, 0x51d5}, {&(0x7f0000000500)="98467e0b3f0b70de919b215adc377a64fdaa9ed90e76993c540f05a5ad2ad1004b7ee79b36df68cd7fab3cabe050761b8b42940f0c877222cb320b1d08bea52cd30fa712bc8f846ea91bf306293234df670676017e0fb204ac6f09e85b192eed5880d4da6d2d783c0f9b0b9269a578b35079dcfc9ff30cf25f860ce62efdd1fa3bbe6dc3e2e81e4fa878809a29b0a2114d98bd9819302fa522a56aa352fcb2ba8640865165fc61eea0406062c2fcaf9e88405ccbbe547e2ff054fe47b9f1fc64005631334377126f88f99dda4a82cb1a85ddd2d32b765f5e01e378ba5e141e46b1868b90b2240b360bdb8d6f5d", 0xed}], 0x80000, &(0x7f0000000840)=ANY=[@ANYBLOB='commit=0x0000000000000003,hostdata=h{keyringnodev)vboxnet0,data=writeback,errors=withdraw,fowner<', @ANYRESDEC=r2, @ANYBLOB="070000006f210002", @ANYRESDEC=r3, @ANYBLOB=',\x00']) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000000c0)={@dev, @empty, 0x0}, &(0x7f0000000100)=0xc) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@remote, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e20, 0x0, 0x4e23, 0x2, 0x2, 0x0, 0x20, 0x2c, r4, r5}, {0x0, 0x2, 0x20, 0x5, 0x0, 0x400, 0x7ca, 0x1}, {0x490c, 0x0, 0x6, 0x7fff}, 0xfffffffffffffffe, 0x6e6bb9, 0x1, 0x1, 0x1}, {{@in6=@remote, 0x4d2, 0xff}, 0xa, @in=@remote, 0x3503, 0x5, 0x3, 0x5, 0x101, 0xfffffffffffffffb, 0x914a}}, 0xe8) write$FUSE_BMAP(r1, &(0x7f0000000300)={0x18, 0x0, 0x5, {0x101}}, 0x18) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='mime_type)/wlan0\x00') mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:53:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) r2 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x13, 0x1, 0xc2, 0x10000, 0x4, r2, 0x3040}, 0x2c) 03:53:05 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xff0f}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:06 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$inet(0x2, 0x3, 0x1) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000180)={{{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000000280)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@ipv4, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f00000003c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000400)={{{@in=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@dev}}, &(0x7f0000000500)=0xe8) r8 = getgid() r9 = getegid() getgroups(0x2, &(0x7f0000000580)=[0x0, 0xee00]) fsetxattr$system_posix_acl(r3, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f00000005c0)={{}, {0x1, 0x2}, [{0x2, 0x0, r4}, {0x2, 0x7, r5}, {0x2, 0x1, r6}, {0x2, 0x4, r7}], {0x4, 0x2}, [{0x8, 0x3, r8}, {0x8, 0x7, r9}, {0x8, 0x7, r10}], {0x10, 0x2}, {0x20, 0x5}}, 0x5c, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000140)="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") ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f00000000c0)={0x6, 0x2, 0x3f, 0xf6, 0x8000}) 03:53:06 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) shmget$private(0x0, 0x1000, 0x1440, &(0x7f00006ff000/0x1000)=nil) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e23, 0x400, @dev={0xfe, 0x80, [], 0x1c}, 0xffff}}, 0xdb1, 0x7}, &(0x7f0000000000)=0x90) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={r1, 0x8, 0x497beef}, 0x8) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:53:06 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x100000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd\a5=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$inet_udp(0x2, 0x2, 0x0) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:53:06 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4, 0x400a00) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000040)={0x41, 0x1, 0x3}, 0x10) [ 1803.658395][ C0] net_ratelimit: 18 callbacks suppressed [ 1803.658408][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1803.672218][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1803.679617][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1803.686003][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1803.693027][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1803.700125][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1803.706724][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1803.713825][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1804.697878][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1804.703756][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:53:08 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:08 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x8000a0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40000, 0x0) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) accept$unix(r1, &(0x7f0000000140)=@abs, &(0x7f00000000c0)=0x6e) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x3}}], [{@seclabel='seclabel'}]}}) ioctl(r0, 0x1000008915, &(0x7f0000000340)="0a9c1f12af57ea664a011e40907efb173f3101003002cd5fba211657c355c57d56ebe65eb5696abbd863719a383091fcc723a59966f6637ef451ff85e681e9541ef150052c1fc816b593a68fee028c9f9d71e1d0b7a7b06d77efd8eb91ac02487a813e9b893480da19ea5bad0f715559bc24f37b28c84948f271a65a36b9080891e916592e94794a7fa699eb07354d943494451fb75daca6e3cfaa061c1343a95f64ef16a1495ac8aca1023da440890c03ecd6333bf068d27272e723f638dcb5a4fd46da6b761231ea3e44a1b0753cc4069cfea3f61c7aa9fd") write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:53:08 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x0) ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f0000000040)) 03:53:08 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) pipe(&(0x7f0000000040)) ioctl$VIDIOC_ENCODER_CMD(r0, 0xc028564d, &(0x7f0000000000)={0x0, 0x1, [0x9, 0x2, 0xffffffff, 0x5, 0xedd2, 0x3, 0x96]}) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c51726f75705f69643d5c55ef6e842ce6870e", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:53:08 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xf0ffff}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d303030303030062405f36ecbef673030303034303030302c757365725f69643d243575ca3a90d1a40fe935875a74c58a84", @ANYRESDEC=0x0, @ANYBLOB=',=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:53:08 executing program 3: io_setup(0x81, &(0x7f0000000180)=0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x40, 0x80) r2 = creat(&(0x7f0000000280)='./file0\x00', 0xa7) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2, 0x9, r1, &(0x7f0000000200)="7d81babfb3b26037144e35447cf632597f12cb2dc9562ed8195c4de5a335774392241b532ce57f834fdd95dd98b7be0beca9f7dcceec56d883f62559f4e929682d5953a250a6c29a9c96ea410f1fd387dfc4a67f6ed36927de676af3f7", 0x5d, 0x1, 0x0, 0x3, r2}, &(0x7f0000000300)) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r3, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x280, 0x0) sendto$inet(r4, &(0x7f00000000c0)="ccfe01724a16fb9d56c571e0e1f6fc4c6bedab3c72b4064258c6072eaa896696545229c758ded46818a236d3bcb947bf481094359039e8a60ce716fa0ead9419b5dbd78c0a132f8d33e45bcc0b429a2546707e9f05f734a926740fc29fb8116d57dc5fdca7b2cd99455fa17b02a3281c2e679fe74379a3113a", 0x79, 0x48000, &(0x7f0000000040)={0x2, 0x4e20, @rand_addr=0x3c795c25}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r4, 0x28, 0x1, &(0x7f0000000140)=0x4, 0x8) 03:53:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x6, &(0x7f0000000240)=[0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00, 0xee01]) r4 = geteuid() mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='fuseblk\x00', 0x2, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read'}}, {@max_read={'max_read'}}, {@blksize={'blksize', 0x3d, 0x800}}, {@max_read={'max_read', 0x3d, 0xffffffffffffffff}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x100000001}}, {@allow_other='allow_other'}], [{@obj_role={'obj_role', 0x3d, 'fuse\x00'}}, {@obj_user={'obj_user', 0x3d, 'fd'}}, {@fowner_gt={'fowner>', r4}}]}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:53:08 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xfeffff}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',gr~up_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:53:11 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:11 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x1000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x560) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="64acfcfcffafd9784aaab21b886fb9299892c1e43d", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x800) ioctl$PIO_FONTX(r2, 0x4b6c, &(0x7f0000000340)="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") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)=ANY=[@ANYPTR=&(0x7f00000000c0)=ANY=[@ANYRESOCT=r1]], 0x8) 03:53:11 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x1000000, 0x11, r0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x100) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f0000000100)={0x7, 0xfffffffffffffffd}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@remote, 0x8000, 0x0, 0xfb, 0x8, 0x9, 0x2}, 0x16) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f00000000c0)={0x50, 0x29a, 0x4}) 03:53:11 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x80806, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000000)=0xc370, 0x4) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0x1a) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x400e40, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = accept(r0, &(0x7f0000000140)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x80) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f00000000c0), 0x4) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:53:11 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) close(r0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x4, 0x400) ioctl$SIOCX25GDTEFACILITIES(r1, 0x89ea, &(0x7f0000000040)) setns(r1, 0x0) [ 1808.089142][ T2490] nbd_handle_cmd: 14 callbacks suppressed [ 1808.089167][ T2490] block nbd4: Attempted send on invalid socket [ 1808.101655][ T2490] print_req_error: 14 callbacks suppressed [ 1808.101666][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1808.117309][ T2490] block nbd4: Attempted send on invalid socket [ 1808.123824][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:53:11 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x2000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:11 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746f6f64653d30303030303030303030303030303030303034303030302c750000000069643dbdd231df072e99afd8d7dcd1c4c71322ec5e9707831b5246b3b207ea99a71155984c210c7dec447c8ae7c04627a0ac5dd4c15c11e20f49d308ef41540d566d4a82873d42c5df86d3250492096a07a912d0d2b1c75d654a872efd79af522dfbfa6fcd99a37bb657afd14b6909e5d2d30da9247a4006ec42117afd97adb0be8f1a0bb37a93202e06609f99df5c6f73757a3e68507ca97f18bedc95bcdf34f5fffa432fa7944571b76d9594484cdb34ea25c56f92a43fc440ee5835fb2ace4482d4f9d41014", @ANYRESDEC=0x0, @ANYBLOB="1ea3050000000000003d36b0cfddd227312a9c52ab77e3148ccfea6b88d890ca005e583eb428d8d1370896a9d9d8508590d0fec44a504b6529eee21c56493744859d14bf3c8cb2a0a721f7a1cb8c3d121626c5477d32b297e3a55108ce1fc94bd99d47f3af6ae324a3bf71d07e5dc3bf53b0adb66c8f4a000ca4f2f755342b89233d200fdec2a54e11906953ee7692c0d40632f12ab94a3a7034db1c94bd6fe3076d93eb21915b65a6fdb9dbfa362854c38e2f6d5083de878648526bdda5a899525dc4e02d49818d970e9af9089aecbc047f9fdf770f39a2c366e20000000000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:53:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="390000000400000000000000000000006f000000000000000000000000000200010000000000000000"], 0x29) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1d, &(0x7f0000000240)={@ipv4={[], [], @initdev}, 0x0}, &(0x7f00000002c0)=0x14) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000340)={r2, 0x8, 0x0, 0xdd4, 0x5, 0x8, 0x2}) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x84000, 0x0) ioctl$ASHMEM_SET_NAME(r3, 0x41007701, &(0x7f00000000c0)='group_id') 03:53:12 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x40) r2 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x2, 0x4002) linkat(r1, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00', 0x400) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:53:12 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x3000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1808.297378][ T2490] block nbd4: Attempted send on invalid socket [ 1808.303815][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1808.312828][ T2490] block nbd4: Attempted send on invalid socket [ 1808.319466][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:53:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = geteuid() fstat(r0, &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfsplus(&(0x7f0000000140)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0x7, 0x4, &(0x7f0000000340)=[{&(0x7f00000001c0), 0x0, 0x80000001}, {&(0x7f0000000200)="90bab6c4b5351e324b350af5c55bec6eebf0b991f929f7158eb3e43bbc061036c578839862b70f1a3447c588576a3e6357fd8ae8bbff7ddae817c03d14f9a275db8690baff693b6ca1d0820cdafa978c27eb2e31209d7675a2e8814b24f6e1edf95ea3f88f021996b7426fd23b4bd58990c622a15d546b", 0x77, 0x1}, {&(0x7f0000000480)="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", 0x1000, 0x1}, {&(0x7f0000001480)="14c7e145b644e421bb73b531af6ebd6c030365c9b6d59e040e24f1e0411cdc885ad3af584a74b84cf482b31f55d961be4817811a833fa8b379a936c5603d15594f1e34a378103dff35754f5a88532850e2142d2bac8867d80238deb5a9e9c6c209145a7e63eaf3a21d3e52e41d02da53623b4b9d9bd1cb021b0db8e1a89ea1461f9b2d01b1be8c2a7bf0a1ea6c023c7d298b0bdfad0a701ab96aa8211f2fec513811a2ff21f72d7ddcc28514ede17fc1fef3dc33a1aa5ffb66da085a59af7c51c353fb8b2e4d637b07196e70dd40ef15cd190e9e7086ee77db24a4adc6670ac6f31df549b76c2e2c2bdca4962dbbb2a6b8dce46d2123", 0xf6, 0xdeca}], 0x2000, &(0x7f0000001600)={[{@creator={'creator', 0x3d, "66590d1c"}}, {@uid={'uid', 0x3d, r2}}, {@type={'type', 0x3d, "9bcffbbc"}}, {@session={'session', 0x3d, 0x6f}}, {@uid={'uid', 0x3d, r3}}, {@nodecompose='nodecompose'}, {@type={'type', 0x3d, "0d723df1"}}], [{@mask={'mask', 0x3d, 'MAY_READ'}}, {@dont_hash='dont_hash'}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x31, 0x39, 0x30, 0x65, 0x39, 0x75, 0x9af830f81e45eb31], 0x2d, [0x0, 0x0, 0xcafcce19e42f7884, 0x37], 0x2d, [0x37, 0x35, 0x61, 0x64], 0x2d, [0x34, 0x34, 0x31, 0x61], 0x2d, [0x37, 0x77, 0x30, 0x77, 0x36, 0x36, 0x32, 0x79]}}}]}) r4 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$ASHMEM_SET_NAME(r4, 0x41007701, &(0x7f00000000c0)='group_id') write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0xffffffffffffffec, 0x0, [0x0]}}, 0x246) 03:53:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:53:12 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) [ 1808.491979][ T2490] block nbd4: Attempted send on invalid socket [ 1808.498681][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1808.515145][ T2490] block nbd4: Attempted send on invalid socket [ 1808.522066][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:53:12 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000080)) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e24, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:12 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x5000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000000240)=0xe8) openat$dir(0xffffffffffffff9c, &(0x7f0000000900)='./file0\x00', 0x200000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast2}}, &(0x7f00000002c0)=0xe8) r4 = syz_open_dev$adsp(&(0x7f0000000940)='/dev/adsp#\x00', 0x0, 0x400840) setns(r4, 0x14020000) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000580)={{{@in=@remote, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@local}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @broadcast}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f0000000380)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000780)=0xc) getresuid(&(0x7f00000007c0), &(0x7f0000000800)=0x0, &(0x7f0000000840)) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000880)={{}, {0x1, 0x3}, [{0x2, 0x5, r2}, {0x2, 0x5, r3}, {0x2, 0x2, r5}, {0x2, 0x5, r6}, {0x2, 0x2, r7}, {0x2, 0x7, r8}], {0x4, 0x4}, [], {0x10, 0x3}, {0x20, 0x3}}, 0x54, 0x3) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:53:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x9, 0x800) ioctl$VT_WAITACTIVE(r1, 0x5607) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="1d98293295c4b6290000000000010000000000000000000000"], 0x29) syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x4aff, 0x200) [ 1808.867830][ C1] net_ratelimit: 22 callbacks suppressed [ 1808.867840][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1808.879639][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1808.972708][ T2489] block nbd4: Attempted send on invalid socket [ 1808.979110][ T2489] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1808.986647][ T2490] block nbd4: Attempted send on invalid socket [ 1808.993144][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 [ 1809.497871][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1809.503685][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1809.897867][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1809.903772][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1809.909658][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1809.915423][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1809.921309][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1809.927087][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:53:15 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:15 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x802, 0x0) flistxattr(r0, &(0x7f0000000180)=""/4096, 0x1000) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200000, 0x0) ioctl$UI_ABS_SETUP(r2, 0x401c5504, &(0x7f0000000040)={0x9, {0x81, 0x8, 0x2, 0x37, 0x8, 0xdd35}}) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000080)) 03:53:15 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x6000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x400, 0x4000) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f0000000340)={0x9, 0x5, 0x1, 0x0, 0x6, 0x3, 0x6}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) r3 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x1ff, 0x2000) name_to_handle_at(r3, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0xfa, 0x1, "8c2638b38002423e68ca6f8509a2ab07f5943ca12393b6a0bf1d7712751b1f8a6d8fc2ec9d88200d4f3588f8840ae2d96d23f2ee4ae41f580a35d1b249aeb6e01f0244355812cd980174c426fb94ec7d481b0a43c88a8465e9298c5e7686fafcd33bfd3a1aca3e4fba69f273ebd5d7486132ef0c975e847de39b643cd78f436f49c4baabc7902f88c68c6b8e8b2d73f52697489cf565de722ff81057c85767bc486202fbff3cba071673c88ec6c99d60dec0046eabf15d3fa871e9a11049a8b01209e71fbd6d4c847b6ba667b64a50d38a1cdf8ce8d580ff3a8dc463a2008c19e46c68828e6c7eadcdba3b4e2141a37d6b10"}, &(0x7f0000000240), 0x400) 03:53:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x9, 0x109000) ioctl$sock_ax25_SIOCADDRT(r2, 0x890b, &(0x7f0000000140)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, 0x2, [@bcast, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:53:15 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) fcntl$setflags(r1, 0x2, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:15 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x202, 0x0) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000000)) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0xff, 0x111040) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f00000000c0)={0x1000, 0xa25, 0xa2, 0x80000001, 0x7, 0xfffffffffffffca0}) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) [ 1811.339666][ T2490] block nbd4: Attempted send on invalid socket [ 1811.345943][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1811.356188][ T2489] block nbd4: Attempted send on invalid socket [ 1811.362528][ T2489] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:53:15 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x7000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:15 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ftruncate(r0, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = fcntl$getown(r0, 0x9) r3 = syz_open_procfs(r2, &(0x7f0000000040)='map_files\x00') write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r3, &(0x7f00000000c0)) 03:53:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d8ff231fa09d447bec1e90689aad4281fb496d119f939d2a4e3d6e4581f0383dac454eab5558aba59fb8c421c96060000ecc54cc26197652e5b8273225f10d1a84610df213fc89a4b23bd32fcb64b301b8b5c840949793e2fb5054f299a7db6400000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYRESDEC=r1]) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:53:15 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = dup(r0) getresuid(&(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0, &(0x7f0000000180)=0x0) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f00000000c0)=0x0) clock_gettime(0x0, &(0x7f00000009c0)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000a00)={{0x2, 0x3, 0x7, 0x7fff, 'syz0\x00', 0x7}, 0x1, [0x0, 0x80000000, 0x100, 0x9, 0x5, 0x8, 0x100, 0x7, 0x20, 0x1, 0x4, 0x1ff, 0x5, 0x2, 0x9, 0x10000, 0x5, 0x5, 0x6, 0x2, 0xd921, 0x6737, 0x100000000, 0x4, 0x1, 0x4c, 0x401, 0x80, 0x7fff, 0x4, 0xffff, 0x69, 0x6, 0x0, 0x0, 0x46db, 0xfffffffffffffffa, 0xfff, 0x1, 0x3ff, 0x80000000, 0x5, 0xe9, 0x7, 0x0, 0x10000, 0x88cc, 0x7, 0x51, 0xfffffffffffffffb, 0x8, 0x6, 0x2, 0xff, 0x2672a694, 0xfffffffffffffffd, 0x4, 0x4, 0xd9, 0x6, 0x8001, 0x400, 0x1, 0x800, 0x6, 0x3, 0x1, 0x40, 0x5, 0x7, 0x328d, 0xa6b, 0x7f, 0x7, 0x80, 0x6, 0x3ff, 0x1ff, 0x7, 0x81, 0x7fff, 0x8cbf, 0x2, 0x3ff, 0x8, 0x3ff, 0x2, 0x1, 0x4, 0x5, 0x4, 0x5, 0x40, 0x8000, 0x800, 0x9, 0x800, 0x7, 0x6, 0x8, 0x9, 0x4, 0x2, 0xc, 0xfff, 0x5, 0x2000000, 0x2028, 0x10001, 0xffffffffffff7fff, 0x19e00000000000, 0x8000, 0x84, 0x100000001, 0x1ff, 0x859c, 0xcfb4, 0x101, 0x8c85, 0x100, 0x4, 0x10001, 0x81, 0x1, 0x4e6, 0x0, 0x9, 0x5], {r6, r7+30000000}}) r8 = getgid() r9 = getegid() getgroups(0x4, &(0x7f0000000200)=[0xee00, 0xee00, 0x0, 0xee00]) r11 = getgid() r12 = getgid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f0000000380)=[0xee01]) write$FUSE_DIRENTPLUS(r1, &(0x7f00000003c0)={0x5d8, 0x0, 0x5, [{{0x1, 0x0, 0x9, 0x100, 0x9, 0x3ff, {0x0, 0xcf8, 0x8, 0x2, 0xfffffffffffffff9, 0x1, 0x81, 0x6, 0x1ff, 0x2, 0x7, r2, r5, 0x8, 0x20}}, {0x3, 0x0, 0xc, 0x8001, '/dev/ashmem\x00'}}, {{0x4, 0x0, 0xffff, 0x484, 0x2, 0x2, {0x4, 0xfffffffffffffffe, 0x5fc6, 0x10000, 0x6, 0x81, 0xfff, 0xfffffffffffffffc, 0x80, 0x100, 0x1, r4, r8, 0x2, 0x1f}}, {0x3, 0x4, 0x2, 0xffff, '+,'}}, {{0x1, 0x3, 0x40, 0x6c4f, 0x0, 0x0, {0x2, 0x80, 0x1, 0x10000, 0x80000001, 0x6, 0xff, 0x12, 0x5, 0x1, 0x19f9, r2, r9, 0x9, 0x1}}, {0x6, 0x4, 0xc, 0x2, '/dev/ashmem\x00'}}, {{0x0, 0x1, 0x6, 0x9, 0x401, 0x800, {0x4, 0x7f, 0x400, 0x1, 0x1a6e, 0xfffffffffffffffd, 0x8, 0x7f, 0x2, 0xaad, 0x9, r3, r10, 0x5, 0x1}}, {0x2, 0x3ff, 0xe, 0x2, ',)lonodev[bdev'}}, {{0x0, 0x3, 0x4, 0x6, 0x6, 0xffffffff, {0x0, 0x217, 0xffffffffffffff7f, 0x0, 0x29, 0x3, 0xc7, 0x4, 0xd9d1, 0x44, 0x20, r3, r11, 0x0, 0x2}}, {0x1, 0x8, 0x0, 0x5}}, {{0x4, 0x3, 0x2, 0x4, 0x7ff, 0x2, {0x2, 0x1, 0xd942, 0x1, 0x1, 0x1ff, 0x7fff, 0x9, 0x8, 0x3f, 0x8000, r4, r12, 0x3, 0x7}}, {0x4, 0xb4, 0xc, 0x3, '/dev/ashmem\x00'}}, {{0x3, 0x1, 0x5, 0x7d4d, 0x2, 0x3, {0x5, 0x100000001, 0x2, 0x8, 0x400, 0x8, 0x8, 0x2, 0x1ff, 0x6, 0x3, r4, r13, 0x80000000, 0xc12}}, {0x3, 0x6, 0xc, 0x3, 'ppp0vboxnet1'}}, {{0x5, 0x0, 0x8, 0x8, 0x1, 0x7, {0x0, 0x0, 0x1ff, 0x9fc, 0x200, 0x0, 0x10001, 0x6, 0x8, 0x8, 0x9, r2, r14, 0x1, 0xfffffffffffffff7}}, {0x5, 0x8, 0x1, 0xd3, '['}}, {{0x2, 0x0, 0xffffffff, 0x7, 0x1, 0x4, {0x3, 0xfffffffffffffff9, 0xffffffff, 0x4, 0x3, 0x0, 0x9, 0x55, 0x5, 0x8001, 0x0, r4, r15, 0x1}}, {0x4, 0x10000, 0xc, 0x7fffffff, '/dev/ashmem\x00'}}]}, 0x5d8) ioctl$SIOCAX25GETUID(r1, 0x89e0, &(0x7f00000001c0)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r4}) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:53:15 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:15 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x8000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:15 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffff9c, 0x10, &(0x7f0000000100)={&(0x7f00000000c0)=""/24, 0x18, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r1, 0x10, &(0x7f0000000180)={&(0x7f0000000040)=""/8, 0x8, r2}}, 0x10) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:53:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x14, &(0x7f0000000340)=ANY=[@ANYBLOB="060944e9d61f3066643d4b93cfb8a4ce03f44f68c4293ae26fde701f5079d1e4c2d62f6859b31786a6b0ab0f477f3988535e267f08115e247f1f2a9d3e49c8950cd59ceb767c217c739b2baf8e9f64b4e4c05049f85a75fdcf27cdf898b2711d7e738a2647000000000000", @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757345725f69643d8bbf3ffebd78bcd37039a0c67d0298a98639ac10f3292def5224a9b0d5d74a53600d1a347d5ef283ab992b54880844814c63c6f1a71d514ec713a0f4c8ebf453468a1def8bb092f5f7edfa2a62a112dc5ba9f50592752b7e1253803a84d1111c7e5a9bf2efcc6a0f5a8325fc826c4b7b56d078bee03506b463bd41336d36900ead3554e3dadb901233dcb94cc74e1154949ce5", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:53:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0xfffffffffffffea2, 0x4, 0x0, {0x1, 0x3, 0x1, 0x0, [0x0]}}, 0x5) 03:53:15 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f00000000c0)={0x40000000}) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f0000000000)=0x5) 03:53:15 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x9000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:15 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2000, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:53:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x10) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000880)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000980)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)=@newtclass={0x58, 0x28, 0x301, 0x70bd28, 0x25dfdbfd, {0x0, r3, {0xd, 0xb}, {0x5, 0x5}, {0xf}}, [@tclass_kind_options=@c_dsmark={{0xc, 0x1, 'dsmark\x00'}, {0xc, 0x2, @TCA_DSMARK_MASK={0x8, 0x4, 0x7}}}, @tclass_kind_options=@c_cbq={{0x8, 0x1, 'cbq\x00'}, {0x14, 0x2, [@TCA_CBQ_RATE={0x10, 0x5, {0x3f, 0x0, 0x2, 0x4, 0x0, 0xb2}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x20004001}, 0x10) 03:53:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0xfffffffffffffffa, 0x10000) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f00000001c0), &(0x7f0000000240)=0x4) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r3 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) ioctl$PPPIOCCONNECT(r3, 0x4004743a, &(0x7f00000000c0)=0x4) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r3, &(0x7f0000000100)={0x2}) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:53:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d7208e46700f2abeac75b7c8e42e3dcb47dcfdb07e4d630f15a51cbe4a381729599c92c51f3b98f63ba899507dc8b06ec1de2d3fac939d4c3969e2a1d0bbe3e652b4af1cc71b687fa0907cc5f79e8746bcb990c194b630e88d0383b89583fcec8a6fa2c1a8dccc9a7953a237e67b2f4f3f45ba188032fec8ae35e9508375b473e039e63aef40000", @ANYRESDEC=0x0, @ANYBLOB="de50"]) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:53:16 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xa000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1814.057826][ C0] net_ratelimit: 18 callbacks suppressed [ 1814.057835][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1814.069412][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1814.075243][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1814.081087][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1814.086950][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1814.092794][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1814.098656][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1814.104425][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:53:18 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:18 executing program 3: getgid() ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x10000007fffffff) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2000, 0x0) accept4$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0x81aa5b5b77069f77, @reserved}, 0x10, 0x80800) r1 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x3, 0x2) ioctl$IOC_PR_REGISTER(r1, 0x401870c8, &(0x7f0000000040)={0x9, 0x200, 0x1}) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x78) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000001c0)=0x4) 03:53:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:53:18 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x20000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@dev}}, &(0x7f00000003c0)=0xe8) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000580)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, r3}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r4 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xffff, 0x40000) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x39, 0x4, 0x7e8, 0x4, 0x8000}, &(0x7f0000000140)=0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0x70, &(0x7f0000000180)={r5, @in6={{0xa, 0x4e24, 0x6, @local, 0x7f}}, [0x9, 0x4, 0x9, 0xf8, 0xfffffffffffffff7, 0x81, 0x7fff, 0x100000000, 0x7, 0x0, 0x8, 0x3, 0xfffffffffffffff9, 0x4, 0x3]}, &(0x7f00000002c0)=0x100) ioctl$CAPI_GET_MANUFACTURER(r4, 0xc0044306, &(0x7f0000000340)=0x4) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:53:18 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:18 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x6283b0df) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x9, 0x2) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000000c0)={{{@in=@multicast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@local, 0x42, r2}) [ 1814.797043][ T2489] nbd_handle_cmd: 10 callbacks suppressed [ 1814.797059][ T2489] block nbd4: Attempted send on invalid socket [ 1814.809519][ T2489] print_req_error: 10 callbacks suppressed [ 1814.809530][ T2489] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1814.818103][ T2489] block nbd4: Attempted send on invalid socket [ 1814.828892][ T2489] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:53:18 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x20100000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000180)='user_id', 0xfffffffffffffffa) keyctl$assume_authority(0x10, r1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r3, 0x4010640d, &(0x7f00000000c0)={0x80000001}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x29) 03:53:18 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_int(r0, 0x0, 0x3f, &(0x7f0000000040)=0x40, 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:53:18 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000001100)='/dev/snd/pcmC#D#p\x00', 0x6, 0x400) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000001140)={0x0, @motion_det}) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400080, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000010c0)={r2, &(0x7f0000000040)="712ee00ce745e311e81b75acdc8aea2b39a89eb596823015", &(0x7f00000000c0)=""/4096}, 0x18) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r3 = getpgid(0x0) fcntl$setown(r2, 0x8, r3) [ 1814.978149][ T2489] block nbd4: Attempted send on invalid socket [ 1814.984456][ T2489] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1814.993265][ T2489] block nbd4: Attempted send on invalid socket [ 1814.999582][ T2489] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:53:18 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x23000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1815.097872][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1815.103770][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:53:18 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x3, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:53:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) 03:53:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) socket$alg(0x26, 0x5, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) [ 1815.223244][ T2489] block nbd4: Attempted send on invalid socket [ 1815.229668][ T2489] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1815.238412][ T2490] block nbd4: Attempted send on invalid socket [ 1815.248985][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:53:19 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40000, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400a000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r2, 0xb01, 0x70bd2b, 0x25dfdbfb, {{}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0xc050}, 0x20000000) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f00000001c0)={0xaa, 0x25c, 0x3, 0x40}) mmap(&(0x7f0000700000/0x3000)=nil, 0x3000, 0x4, 0x10000000011, r0, 0x0) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f0000000200)={0x9, 0x4, 0x1, 0x4, 0x40, 0x80000000}) 03:53:19 executing program 1: 03:53:19 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000000)={0x7fff, 0x797, 0x1, 0xfffffffffffffffd, 0x19, 0x5, 0x7fff, 0x4, 0x3ff, 0x80000001}) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:19 executing program 3: r0 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x40, 0x400000) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="080101626c020000ae0200000200000090020000010000800000000000000000d2d6d59b49342be5b816d0bd9b476bfd5f70ecc050fb25d3e15524d4ff13d9a717bd23150a12f5798cc9ec90e22ec9060e175a27f53af9b98cfae000a9c8f4aaf8a8259137ef3f300296dd036dec2b2e5909f625dd33c6fcf9fb21ccec88fecd845b4e2c650bf07ff4678b323ef3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000088192a6687e4fe2b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e4ff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e5ffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x48e) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x101000, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r2, 0x4020565b, &(0x7f0000000040)={0x8001002, 0x2, 0x1}) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) 03:53:19 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x3f000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1815.719485][ T2490] block nbd4: Attempted send on invalid socket [ 1815.725865][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1815.734101][ T2490] block nbd4: Attempted send on invalid socket [ 1815.740876][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:53:21 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = accept4(r0, &(0x7f0000000340)=@l2, &(0x7f0000000240)=0x80, 0x800) fgetxattr(r1, &(0x7f00000003c0)=@random={'system.', '/dev/sequencer2\x00'}, &(0x7f0000000400)=""/4096, 0x1000) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0xa0051, r1, 0x0) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e24, 0x10001, @empty, 0x89}, 0x1c) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) mkdirat(r2, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030304ded000000000000303030302c757365725f69643dcf3107c2c6f83736e187591f6864a5b117926312144f1e901f7932453ed9a76cd7f0ad7652526ff7fcf32d8ca493b92cddc23aaab4e15d2350cfd1a40c07e191c6fb0f2d40d86fc49a", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="04bcbf2ee59668e700"]) ioctl(r0, 0x1000008912, &(0x7f0000001440)="0adc1f123c123f3188b070") ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000001480)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r3, 0x4008642b, &(0x7f00000014c0)={r5, 0x20}) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$UFFDIO_ZEROPAGE(r6, 0xc020aa04, &(0x7f00000000c0)={{&(0x7f0000ffb000/0x4000)=nil, 0x4000}, 0x1}) setsockopt$inet_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000001400)='tls\x00', 0x4) write$FUSE_NOTIFY_STORE(r4, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r6, 0x404c534a, &(0x7f0000001500)={0xadc0, 0x8000, 0x6}) 03:53:21 executing program 1: 03:53:21 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1000, 0x400600) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:53:21 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x40000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:21 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") r4 = socket(0x40000000015, 0x5, 0x0) connect$inet(r4, &(0x7f0000000900)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) sendto$inet(r4, &(0x7f0000000a00)="ba", 0x1, 0x0, 0x0, 0x0) recvmsg(r4, &(0x7f0000005c80)={&(0x7f00000001c0)=@xdp, 0x80, 0x0, 0x0, 0x0, 0xfffffcf7}, 0x20) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) socket$inet(0x2, 0x4, 0x7) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:21 executing program 1: 03:53:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="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", 0x1000}, {&(0x7f0000000040)="6f2b70642385080fb99d9b0410f94a8c00eba9f9e4d0be05e0b8824569", 0x1d}, {&(0x7f00000000c0)="5c812342eee35a82ce29ca456834b3f4a974ab793374b46bf8e6a1c03bfcdf8df61e64b3f7b0405fcc6528ebb8fb098e5cd5393a5b", 0x35}, {&(0x7f0000000140)="3a5368e5df2af16b5748c62ac2cb37651bfb6a89f748bae961052866ff0740c3f75eebc69f3afc1ad16b5d9221271bbd41faeaf67c5348b5dd7b998eca678e020bc9143e0d1e4f5b4cb804479976af3a6bd5343de28e8dc381d73b56acfb1dd63b6dae90d86051a0b577e49b18529aaf36db5295f67572d5a1c4263bc70121982b1e1c716f796cb5de85dee175312dbd405a998c3529bae745a2adbd922a20df36d3eb22f0088cba13d0195678ad3b134a35dcb049ae0ecc7f562b972b644df120f8940e739a73d81d834545f8b43e114905759cf7f61bb151bb064078d383", 0xdf}, {&(0x7f0000002480)="2dab5fb4c37c48fdbf8d334c57ba13db4cde8049ae1759e8d9adbbabf28808cac3b6bdb374feb7d2e0549874dbb90009f0e0a5121828065227c206bc90e8ff528f83b2bbc644524af6995c1002b97bcca9e0d152d61b3686d99a88efc625248240d7e85084d823006a0982389cba89c58bbf5c236b87356ac7f8c9aa7c02fffc0d2587a636aded95129106b9ea57832536470cd80e547e466b2b3f4356bb454e2b221d6d46cf393e7e1179c1f3b5863d83b78bb31b818690965dcc8556a59d20f536281cc8418a8af658abcdfed5ae4f11a752a9fce6bf4f4a0a3d669535a371af", 0xe1}], 0x6, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000002580)=ANY=[@ANYBLOB="a1b4b4cc40bbac52c31c77b64481d24f07102e089b6c9914c4a2b56458704ca19d10124fe52d661d43c94dfc33c4bbac25a4ced4af083f74e960cbc4255779bb72824f5a10b400000000000000000000", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) [ 1818.116381][ T2489] block nbd4: Attempted send on invalid socket [ 1818.122725][ T2489] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1818.138811][ T2489] block nbd4: Attempted send on invalid socket [ 1818.145425][ T2489] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:53:21 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000004c0)='/dev/snd/pcmC#D#p\x00', 0x100000000, 0x100) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000500)=0x8) recvmsg(r1, &(0x7f0000000480)={&(0x7f00000000c0)=@ax25={{0x3, @rose}, [@netrom, @default, @bcast, @rose, @rose, @null, @remote, @null]}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/238, 0xee}, {&(0x7f0000000040)=""/31, 0x1f}, {&(0x7f0000000240)=""/81, 0x51}, {&(0x7f00000002c0)=""/211, 0xd3}], 0x4, &(0x7f0000000400)=""/83, 0x53}, 0x100) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) 03:53:22 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x8cffffff}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:22 executing program 1: 03:53:22 executing program 0: [ 1819.257874][ C1] net_ratelimit: 22 callbacks suppressed [ 1819.257883][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1819.269409][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1819.897825][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1819.903647][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1820.297849][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1820.303669][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1820.309562][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1820.315361][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1820.321214][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1820.326999][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:53:24 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x83) fsetxattr$security_smack_entry(r0, &(0x7f0000000200)='security.SMACK64IPOUT\x00', &(0x7f0000000240)='selinux]-mime_type\x00', 0x13, 0x1) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = dup3(r0, r0, 0x80000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') clock_getres(0x7, &(0x7f0000000280)) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xc0, r2, 0x421, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x18}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x80000001}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x586b}]}]}, 0xc0}}, 0x0) 03:53:24 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:24 executing program 1: 03:53:24 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xa0008000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:24 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0xe003) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f00000000c0)={0x0, 0x7f}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f00000001c0)={r3, 0x1b, "6f43607398b00b924b6967f3a8352e87085fb62ff67ea6a2a5ce46"}, &(0x7f0000000200)=0x23) ioctl(r1, 0x439, &(0x7f0000000340)="0adc3e9e2063e3a5c457a3212d6b0a57074fd1f712c3c14f8db71506b65a86d4ce335fe36ca6c193dbf38cbe48f309c51fcec91ed2fe4bf74bcb95129c4b6fd058fedf7adeda48868e070a907f2fc092bfb58ea299797dcca020b36af23286ca38341287a6e18ad01e961a2a4254d07b6538d056c1de51c7e6371cd78a23501469d02fd983bbcfd1dba9ea673bc5a74a8c59") write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000080)={0x29, 0x4, 0x0, {0x1, 0x0, 0x1, 0x0, [0x0]}}, 0x29) 03:53:24 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:24 executing program 1: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:25 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x42) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f00000001c0)) socket$bt_hidp(0x1f, 0x3, 0x6) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) [ 1821.181603][ T2490] block nbd4: Attempted send on invalid socket [ 1821.188471][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1821.198446][ T2490] block nbd4: Attempted send on invalid socket [ 1821.204811][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:53:25 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xc0ed0000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:25 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:25 executing program 0 (fault-call:8 fault-nth:0): pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:25 executing program 1: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:25 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xf4ffffff}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1821.388764][ T2490] block nbd4: Attempted send on invalid socket [ 1821.395731][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1821.405103][ T2490] block nbd4: Attempted send on invalid socket [ 1821.411959][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:53:25 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x80, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f00000001c0)={[{0xe1, 0x1f, 0x3, 0x81, 0x1000, 0x1, 0x2628, 0x5, 0x5, 0x2c1c000000000000, 0x200, 0x4, 0x2}, {0xfffffffffffffffa, 0xffffffffffffffff, 0x9, 0x4, 0x3ff, 0x7261, 0x0, 0x6, 0x3, 0x1, 0xfff, 0x8, 0x401}, {0x4, 0x7f, 0x80, 0x401, 0x9, 0x1, 0x8d2b, 0x6, 0xe93a, 0x5, 0x3, 0x6, 0x100020000}], 0xffff}) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) socket$inet_sctp(0x2, 0x0, 0x84) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'U-', 0x20}, 0xfffffffffffffee9, 0x2) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x101040, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x10204, 0x2, 0x3000, 0x1000, &(0x7f0000700000/0x1000)=nil}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) 03:53:25 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xf5ffffff}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1821.586309][T12347] FAULT_INJECTION: forcing a failure. [ 1821.586309][T12347] name failslab, interval 1, probability 0, space 0, times 0 [ 1821.635866][T12347] CPU: 1 PID: 12347 Comm: syz-executor.0 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1821.662440][T12347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1821.679426][T12347] Call Trace: [ 1821.685510][T12347] dump_stack+0x172/0x1f0 [ 1821.694668][T12347] should_fail.cold+0xa/0x15 [ 1821.701294][T12347] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1821.710607][T12347] ? kasan_check_read+0x11/0x20 [ 1821.719725][T12347] __should_failslab+0x121/0x190 [ 1821.727162][T12347] should_failslab+0x9/0x14 [ 1821.742344][T12347] kmem_cache_alloc+0x47/0x6f0 [ 1821.752488][T12347] ? __lock_acquire+0x548/0x3fb0 [ 1821.760406][T12347] dst_alloc+0x10e/0x200 [ 1821.766025][T12347] rt_dst_alloc+0x83/0x3f0 [ 1821.774199][T12347] ip_route_output_key_hash_rcu+0x97d/0x30e0 [ 1821.787307][T12347] ? ip_route_input_noref+0x280/0x280 [ 1821.796022][T12347] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1821.802268][T12347] ? kasan_check_read+0x11/0x20 [ 1821.807151][T12347] ip_route_output_key_hash+0x212/0x380 [ 1821.812696][T12347] ? ip_route_output_key_hash_rcu+0x30e0/0x30e0 [ 1821.818960][T12347] ? raw_sendmsg+0x6be/0x2f20 [ 1821.823721][T12347] ? _copy_from_iter_full+0x25d/0x900 [ 1821.829116][T12347] ip_route_output_flow+0x28/0xc0 [ 1821.834156][T12347] raw_sendmsg+0xa1e/0x2f20 [ 1821.838656][T12347] ? compat_raw_getsockopt+0x100/0x100 [ 1821.844147][T12347] ? process_measurement+0xd5d/0x1570 [ 1821.849549][T12347] ? process_measurement+0xd5d/0x1570 [ 1821.854945][T12347] ? ___might_sleep+0x163/0x280 [ 1821.860117][T12347] ? __might_sleep+0x95/0x190 [ 1821.864850][T12347] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1821.870468][T12347] ? aa_sk_perm+0x288/0x880 [ 1821.874959][T12347] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1821.880493][T12347] inet_sendmsg+0x147/0x5e0 [ 1821.884981][T12347] ? compat_raw_getsockopt+0x100/0x100 [ 1821.890431][T12347] ? inet_sendmsg+0x147/0x5e0 [ 1821.895585][T12347] ? ipip_gro_receive+0x100/0x100 [ 1821.900709][T12347] sock_sendmsg+0xdd/0x130 [ 1821.905166][T12347] kernel_sendmsg+0x44/0x50 [ 1821.909699][T12347] sock_no_sendpage+0x116/0x150 [ 1821.914596][T12347] ? sock_kfree_s+0x70/0x70 [ 1821.919109][T12347] inet_sendpage+0x44a/0x630 [ 1821.923703][T12347] kernel_sendpage+0x95/0xf0 [ 1821.928290][T12347] ? inet_sendmsg+0x5e0/0x5e0 [ 1821.932967][T12347] sock_sendpage+0x8b/0xc0 [ 1821.937406][T12347] ? pipe_lock+0x6e/0x80 [ 1821.941654][T12347] pipe_to_sendpage+0x299/0x370 [ 1821.946515][T12347] ? kernel_sendpage+0xf0/0xf0 [ 1821.951283][T12347] ? direct_splice_actor+0x1a0/0x1a0 [ 1821.956604][T12347] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1821.962866][T12347] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 1821.968964][T12347] __splice_from_pipe+0x395/0x7d0 [ 1821.973997][T12347] ? direct_splice_actor+0x1a0/0x1a0 [ 1821.979946][T12347] ? direct_splice_actor+0x1a0/0x1a0 [ 1821.985250][T12347] splice_from_pipe+0x108/0x170 [ 1821.990117][T12347] ? splice_shrink_spd+0xd0/0xd0 [ 1821.995074][T12347] ? apparmor_file_permission+0x25/0x30 [ 1822.000617][T12347] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1822.006861][T12347] ? security_file_permission+0x94/0x380 [ 1822.012512][T12347] generic_splice_sendpage+0x3c/0x50 [ 1822.018066][T12347] ? splice_from_pipe+0x170/0x170 [ 1822.023108][T12347] do_splice+0x70a/0x13c0 [ 1822.027468][T12347] ? opipe_prep.part.0+0x2d0/0x2d0 [ 1822.032604][T12347] ? __fget_light+0x1a9/0x230 [ 1822.037304][T12347] __x64_sys_splice+0x2c6/0x330 [ 1822.042170][T12347] do_syscall_64+0x103/0x610 [ 1822.046767][T12347] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1822.052777][T12347] RIP: 0033:0x458209 [ 1822.056678][T12347] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1822.076305][T12347] RSP: 002b:00007efd8c210c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 1822.084727][T12347] RAX: ffffffffffffffda RBX: 00007efd8c210c90 RCX: 0000000000458209 [ 1822.092695][T12347] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 1822.100669][T12347] RBP: 000000000073bfa0 R08: 0000000000810003 R09: 000000000000000b [ 1822.108707][T12347] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efd8c2116d4 [ 1822.116692][T12347] R13: 00000000004c6fdc R14: 00000000004dbc20 R15: 0000000000000007 03:53:25 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r3, 0x2, 0x8, 0xfffffffffffffff8) splice(r0, 0x0, r2, 0x0, 0x7ffffffe, 0xb) 03:53:26 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 03:53:26 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xf6ffffff}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:26 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x80000, 0x10) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) 03:53:26 executing program 0 (fault-call:8 fault-nth:1): pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:26 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xf9fdffff}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1822.464396][T12382] FAULT_INJECTION: forcing a failure. [ 1822.464396][T12382] name failslab, interval 1, probability 0, space 0, times 0 [ 1822.488014][T12382] CPU: 0 PID: 12382 Comm: syz-executor.0 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1822.497190][T12382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1822.507261][T12382] Call Trace: [ 1822.510848][T12382] dump_stack+0x172/0x1f0 [ 1822.515202][T12382] should_fail.cold+0xa/0x15 [ 1822.519844][T12382] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1822.525680][T12382] ? ___might_sleep+0x163/0x280 [ 1822.530558][T12382] __should_failslab+0x121/0x190 [ 1822.535515][T12382] should_failslab+0x9/0x14 [ 1822.535534][T12382] kmem_cache_alloc_node+0x264/0x710 [ 1822.535554][T12382] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1822.535580][T12382] __alloc_skb+0xd5/0x5e0 [ 1822.545468][T12382] ? skb_trim+0x190/0x190 [ 1822.545493][T12382] ? __ip_append_data.isra.0+0x195f/0x2dd0 [ 1822.545516][T12382] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 1822.545541][T12382] ? raw_destroy+0x30/0x30 [ 1822.545565][T12382] ? __lock_acquire+0x548/0x3fb0 [ 1822.580469][T12382] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 1822.586875][T12382] ? ipv4_mtu+0x2a9/0x400 [ 1822.591202][T12382] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1822.597443][T12382] ? ip_setup_cork+0x53b/0x870 [ 1822.602301][T12382] ? raw_destroy+0x30/0x30 [ 1822.606740][T12382] ip_append_data.part.0+0xf2/0x170 [ 1822.611976][T12382] ? raw_destroy+0x30/0x30 [ 1822.616461][T12382] ip_append_data+0x6e/0x90 [ 1822.620991][T12382] raw_sendmsg+0xbe6/0x2f20 [ 1822.625529][T12382] ? compat_raw_getsockopt+0x100/0x100 [ 1822.631100][T12382] ? process_measurement+0xd5d/0x1570 [ 1822.636489][T12382] ? process_measurement+0xd5d/0x1570 [ 1822.641910][T12382] ? ___might_sleep+0x163/0x280 [ 1822.646770][T12382] ? __might_sleep+0x95/0x190 [ 1822.651452][T12382] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1822.657107][T12382] ? aa_sk_perm+0x288/0x880 [ 1822.661647][T12382] ? retint_kernel+0x2d/0x2d [ 1822.666270][T12382] ? trace_hardirqs_on_caller+0x6a/0x220 [ 1822.672013][T12382] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1822.677568][T12382] inet_sendmsg+0x147/0x5e0 [ 1822.682063][T12382] ? compat_raw_getsockopt+0x100/0x100 [ 1822.687525][T12382] ? inet_sendmsg+0x147/0x5e0 [ 1822.692226][T12382] ? ipip_gro_receive+0x100/0x100 [ 1822.697243][T12382] sock_sendmsg+0xdd/0x130 [ 1822.701653][T12382] kernel_sendmsg+0x44/0x50 [ 1822.706369][T12382] sock_no_sendpage+0x116/0x150 [ 1822.711256][T12382] ? sock_kfree_s+0x70/0x70 [ 1822.715787][T12382] inet_sendpage+0x44a/0x630 [ 1822.720386][T12382] kernel_sendpage+0x95/0xf0 [ 1822.725066][T12382] ? inet_sendmsg+0x5e0/0x5e0 [ 1822.729768][T12382] sock_sendpage+0x8b/0xc0 [ 1822.734194][T12382] pipe_to_sendpage+0x299/0x370 [ 1822.739077][T12382] ? kernel_sendpage+0xf0/0xf0 [ 1822.743848][T12382] ? direct_splice_actor+0x1a0/0x1a0 [ 1822.749131][T12382] ? __splice_from_pipe+0x245/0x7d0 [ 1822.754333][T12382] __splice_from_pipe+0x395/0x7d0 [ 1822.759347][T12382] ? direct_splice_actor+0x1a0/0x1a0 [ 1822.764749][T12382] ? direct_splice_actor+0x1a0/0x1a0 [ 1822.770036][T12382] splice_from_pipe+0x108/0x170 [ 1822.774879][T12382] ? splice_shrink_spd+0xd0/0xd0 [ 1822.780004][T12382] ? apparmor_file_permission+0x25/0x30 [ 1822.785572][T12382] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1822.791821][T12382] ? security_file_permission+0x94/0x380 [ 1822.797464][T12382] generic_splice_sendpage+0x3c/0x50 [ 1822.802746][T12382] ? splice_from_pipe+0x170/0x170 [ 1822.807765][T12382] do_splice+0x70a/0x13c0 [ 1822.812087][T12382] ? opipe_prep.part.0+0x2d0/0x2d0 [ 1822.817197][T12382] ? __fget_light+0x1a9/0x230 [ 1822.821888][T12382] __x64_sys_splice+0x2c6/0x330 [ 1822.826874][T12382] do_syscall_64+0x103/0x610 [ 1822.831467][T12382] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1822.837557][T12382] RIP: 0033:0x458209 [ 1822.841535][T12382] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1822.862162][T12382] RSP: 002b:00007efd8c210c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 1822.870591][T12382] RAX: ffffffffffffffda RBX: 00007efd8c210c90 RCX: 0000000000458209 [ 1822.878581][T12382] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 1822.886545][T12382] RBP: 000000000073bfa0 R08: 0000000000810003 R09: 000000000000000b [ 1822.894510][T12382] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efd8c2116d4 [ 1822.902643][T12382] R13: 00000000004c6fdc R14: 00000000004dbc20 R15: 0000000000000007 03:53:28 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:28 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x1, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) [ 1824.467783][ C0] net_ratelimit: 18 callbacks suppressed [ 1824.467792][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1824.479303][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1824.489052][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1824.500026][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1824.505959][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1824.511765][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:53:28 executing program 1: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:28 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xfbffffff}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:28 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000080)={0x57, 0x60c, 0x2, {0x8, 0x1}, {0x7, 0x40}, @period={0x5f, 0x80000001, 0x3, 0x8, 0x4, {0x3, 0x8, 0x5, 0xba1}, 0x7, &(0x7f0000000000)=[0x1f71, 0x9, 0x2d14, 0x3, 0x7fffffff, 0x1ff, 0xfffffffffffffffc]}}) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f00000000c0)={0x7fff, 0xa2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:28 executing program 0 (fault-call:8 fault-nth:2): pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:28 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/snmp\x00') bind$isdn_base(r0, &(0x7f0000000040)={0x22, 0x1000000000000, 0x4, 0x4, 0x8}, 0x6) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x1e, r1, 0x0) r2 = semget(0x3, 0x0, 0xc0) semctl$GETVAL(r2, 0x3, 0xc, &(0x7f00000000c0)=""/4096) 03:53:28 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1824.517561][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1824.523563][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:53:28 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006fe000/0x3000)=nil, 0x3000, 0x8, 0x20010, r0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@empty}}, &(0x7f0000000040)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) r4 = syz_open_dev$dmmidi(&(0x7f0000000440)='/dev/dmmidi#\x00', 0x5, 0x80) ioctl$SNDRV_TIMER_IOCTL_STATUS(r4, 0x80605414, &(0x7f0000000480)=""/173) r5 = getegid() lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000380)=[0x0, 0xffffffffffffffff]) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="02000000010001000000000002000400", @ANYRES32=r1, @ANYBLOB="02000200", @ANYRES32=r2, @ANYBLOB="02000400", @ANYRES32=r3, @ANYBLOB="040006000000000008000200", @ANYRES32=r5, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r7, @ANYBLOB="10000480220000"], 0x54, 0x3) r8 = add_key(&(0x7f0000000540)='logon\x00', &(0x7f0000000580)={'syz', 0x0}, &(0x7f00000005c0)="a06a7aaad97c", 0x6, 0xfffffffffffffffb) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r4, 0x84, 0x4, &(0x7f0000000680)=0x4, 0x4) r9 = add_key$keyring(&(0x7f0000000600)='keyring\x00', &(0x7f0000000640)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r8, r9) 03:53:28 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:28 executing program 1 (fault-call:14 fault-nth:0): sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:53:28 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xfeffffff}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1824.654638][T12415] FAULT_INJECTION: forcing a failure. [ 1824.654638][T12415] name failslab, interval 1, probability 0, space 0, times 0 [ 1824.686293][T12415] CPU: 1 PID: 12415 Comm: syz-executor.0 Not tainted 5.1.0-rc2-next-20190326 #11 03:53:28 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40000, 0x0) connect$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x3, @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1e) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffb) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x1, 0x11, r0, 0x0) [ 1824.695451][T12415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1824.705524][T12415] Call Trace: [ 1824.708834][T12415] dump_stack+0x172/0x1f0 [ 1824.713178][T12415] should_fail.cold+0xa/0x15 [ 1824.717771][T12415] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1824.723589][T12415] ? ___might_sleep+0x163/0x280 [ 1824.728439][T12415] __should_failslab+0x121/0x190 [ 1824.733418][T12415] should_failslab+0x9/0x14 [ 1824.737916][T12415] kmem_cache_alloc_node_trace+0x270/0x720 [ 1824.743721][T12415] __kmalloc_node_track_caller+0x3d/0x70 [ 1824.749376][T12415] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1824.754833][T12415] __alloc_skb+0x10b/0x5e0 [ 1824.759251][T12415] ? skb_trim+0x190/0x190 [ 1824.763588][T12415] ? rt_set_nexthop.constprop.0+0x4ab/0x11c0 [ 1824.769553][T12415] ? dst_init+0x38e/0x4d0 [ 1824.773881][T12415] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 1824.779545][T12415] ? raw_destroy+0x30/0x30 [ 1824.783966][T12415] ? __lock_acquire+0x548/0x3fb0 [ 1824.788900][T12415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1824.795144][T12415] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 1824.801563][T12415] ? ipv4_mtu+0x2a9/0x400 [ 1824.805923][T12415] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1824.812157][T12415] ? ip_setup_cork+0x53b/0x870 [ 1824.816924][T12415] ? raw_destroy+0x30/0x30 [ 1824.821361][T12415] ip_append_data.part.0+0xf2/0x170 [ 1824.826582][T12415] ? raw_destroy+0x30/0x30 [ 1824.831037][T12415] ip_append_data+0x6e/0x90 [ 1824.835534][T12415] raw_sendmsg+0xbe6/0x2f20 [ 1824.840035][T12415] ? compat_raw_getsockopt+0x100/0x100 [ 1824.845503][T12415] ? process_measurement+0xd5d/0x1570 [ 1824.850889][T12415] ? process_measurement+0xd5d/0x1570 [ 1824.856267][T12415] ? ___might_sleep+0x163/0x280 [ 1824.861141][T12415] ? __might_sleep+0x95/0x190 [ 1824.865816][T12415] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1824.871610][T12415] ? aa_sk_perm+0x288/0x880 [ 1824.876142][T12415] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1824.881710][T12415] inet_sendmsg+0x147/0x5e0 [ 1824.886292][T12415] ? compat_raw_getsockopt+0x100/0x100 [ 1824.891756][T12415] ? inet_sendmsg+0x147/0x5e0 [ 1824.896422][T12415] ? ipip_gro_receive+0x100/0x100 [ 1824.902026][T12415] sock_sendmsg+0xdd/0x130 [ 1824.906431][T12415] kernel_sendmsg+0x44/0x50 [ 1824.911038][T12415] sock_no_sendpage+0x116/0x150 [ 1824.915884][T12415] ? sock_kfree_s+0x70/0x70 [ 1824.920397][T12415] inet_sendpage+0x44a/0x630 [ 1824.925004][T12415] kernel_sendpage+0x95/0xf0 [ 1824.929613][T12415] ? inet_sendmsg+0x5e0/0x5e0 [ 1824.934288][T12415] sock_sendpage+0x8b/0xc0 [ 1824.938707][T12415] ? pipe_lock+0x6e/0x80 [ 1824.942939][T12415] pipe_to_sendpage+0x299/0x370 [ 1824.947797][T12415] ? kernel_sendpage+0xf0/0xf0 [ 1824.952553][T12415] ? direct_splice_actor+0x1a0/0x1a0 [ 1824.957851][T12415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1824.964102][T12415] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 1824.970187][T12415] __splice_from_pipe+0x395/0x7d0 [ 1824.975201][T12415] ? direct_splice_actor+0x1a0/0x1a0 [ 1824.980506][T12415] ? direct_splice_actor+0x1a0/0x1a0 [ 1824.985800][T12415] splice_from_pipe+0x108/0x170 [ 1824.990643][T12415] ? splice_shrink_spd+0xd0/0xd0 [ 1824.995581][T12415] ? apparmor_file_permission+0x25/0x30 [ 1825.001114][T12415] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1825.007366][T12415] ? security_file_permission+0x94/0x380 [ 1825.013000][T12415] generic_splice_sendpage+0x3c/0x50 [ 1825.018282][T12415] ? splice_from_pipe+0x170/0x170 [ 1825.023305][T12415] do_splice+0x70a/0x13c0 [ 1825.027640][T12415] ? opipe_prep.part.0+0x2d0/0x2d0 [ 1825.032761][T12415] ? __fget_light+0x1a9/0x230 [ 1825.037446][T12415] __x64_sys_splice+0x2c6/0x330 [ 1825.042302][T12415] do_syscall_64+0x103/0x610 [ 1825.046914][T12415] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1825.052817][T12415] RIP: 0033:0x458209 [ 1825.056718][T12415] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1825.076402][T12415] RSP: 002b:00007efd8c210c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 1825.084803][T12415] RAX: ffffffffffffffda RBX: 00007efd8c210c90 RCX: 0000000000458209 [ 1825.092764][T12415] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 1825.100728][T12415] RBP: 000000000073bfa0 R08: 0000000000810003 R09: 000000000000000b [ 1825.108822][T12415] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efd8c2116d4 [ 1825.116935][T12415] R13: 00000000004c6fdc R14: 00000000004dbc20 R15: 0000000000000007 03:53:29 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xff0f0000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:29 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000040)={{0x3eb, 0x0, 0x40, 0x200, 0x7, 0x30}, 0xffffffff80000001, 0x9, 0x4}) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) [ 1825.335860][T12431] FAULT_INJECTION: forcing a failure. [ 1825.335860][T12431] name failslab, interval 1, probability 0, space 0, times 0 [ 1825.363384][ T2490] block nbd4: Attempted send on invalid socket [ 1825.369711][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1825.372782][T12431] CPU: 0 PID: 12431 Comm: syz-executor.1 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1825.377400][ T2490] block nbd4: Attempted send on invalid socket [ 1825.385939][T12431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1825.385945][T12431] Call Trace: [ 1825.385970][T12431] dump_stack+0x172/0x1f0 [ 1825.385988][T12431] should_fail.cold+0xa/0x15 [ 1825.386006][T12431] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1825.386022][T12431] ? __should_failslab+0x99/0x190 [ 1825.386041][T12431] __should_failslab+0x121/0x190 [ 1825.386059][T12431] should_failslab+0x9/0x14 [ 1825.386074][T12431] kmem_cache_alloc+0x2b2/0x6f0 [ 1825.386089][T12431] ? apparmor_capable+0x2ed/0x630 [ 1825.386102][T12431] ? cap_capable+0x205/0x270 [ 1825.386122][T12431] getname_flags+0xd6/0x5b0 [ 1825.386140][T12431] user_path_mountpoint_at+0x29/0x50 [ 1825.386166][T12431] ksys_umount+0x167/0xf00 [ 1825.392745][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 [ 1825.402610][T12431] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1825.402639][T12431] ? __detach_mounts+0x320/0x320 [ 1825.402658][T12431] ? retint_kernel+0x2d/0x2d [ 1825.402682][T12431] __x64_sys_umount+0x54/0x80 [ 1825.402697][T12431] do_syscall_64+0x103/0x610 [ 1825.402715][T12431] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1825.402726][T12431] RIP: 0033:0x458209 [ 1825.402749][T12431] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1825.497909][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1825.501757][T12431] RSP: 002b:00007fc0155b7c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 1825.505729][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1825.525359][T12431] RAX: ffffffffffffffda RBX: 00007fc0155b7c90 RCX: 0000000000458209 [ 1825.525369][T12431] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000800 [ 1825.525376][T12431] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1825.525383][T12431] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc0155b86d4 03:53:29 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x200100, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004a80)=[{{&(0x7f0000000280)=@generic, 0x80, &(0x7f0000001840)=[{&(0x7f0000000300)=""/20, 0x14}, {&(0x7f0000000340)=""/178, 0xb2}, {&(0x7f00000004c0)=""/129, 0x81}, {&(0x7f0000000400)=""/91, 0x5b}, {&(0x7f0000000580)=""/207, 0xcf}, {&(0x7f0000000680)=""/211, 0xd3}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000001780)=""/163, 0xa3}], 0x8, &(0x7f00000018c0)=""/171, 0xab}, 0x5e}, {{&(0x7f00000062c0)=@sco, 0x80, &(0x7f0000001c00)=[{&(0x7f0000001a00)=""/78, 0x4e}, {&(0x7f0000001a80)=""/168, 0xa8}, {&(0x7f0000001b40)=""/129, 0x81}], 0x3, &(0x7f0000001c40)=""/201, 0xc9}, 0x5}, {{&(0x7f0000001d40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000002000)=[{&(0x7f0000001dc0)=""/165, 0xa5}, {&(0x7f0000001e80)=""/176, 0xb0}, {&(0x7f0000001f40)=""/45, 0x2d}, {&(0x7f0000001f80)=""/112, 0x70}], 0x4, &(0x7f0000002040)=""/213, 0xd5}, 0xfc63}, {{0x0, 0x0, &(0x7f0000002680)=[{&(0x7f0000002140)=""/113, 0x71}, {&(0x7f00000021c0)=""/246, 0xf6}, {&(0x7f00000022c0)=""/206, 0xce}, {&(0x7f00000023c0)=""/221, 0xdd}, {&(0x7f00000024c0)=""/43, 0x2b}, {&(0x7f0000006180)=""/217, 0xd9}, {&(0x7f0000002600)=""/103, 0x67}], 0x7, &(0x7f0000002700)=""/147, 0x93}, 0x100}, {{&(0x7f00000027c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000002880)=[{&(0x7f0000002840)=""/16, 0x10}], 0x1, &(0x7f00000028c0)=""/77, 0x4d}, 0x26}, {{&(0x7f0000002940)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000002bc0)=[{&(0x7f00000029c0)=""/124, 0x7c}, {&(0x7f0000002a40)=""/136, 0x88}, {&(0x7f0000002b00)=""/155, 0x9b}], 0x3, &(0x7f0000002c00)=""/11, 0xb}, 0x86}, {{&(0x7f0000002c40)=@nl=@proc, 0x80, &(0x7f0000002fc0)=[{&(0x7f0000002cc0)=""/22, 0x16}, {&(0x7f0000002d00)=""/254, 0xfe}, {&(0x7f0000002e00)=""/167, 0xa7}, {&(0x7f0000002ec0)=""/207, 0xcf}], 0x4, &(0x7f0000003000)=""/177, 0xb1}, 0x2}, {{0x0, 0x0, &(0x7f0000004340)=[{&(0x7f00000030c0)=""/40, 0x28}, {&(0x7f0000003100)=""/181, 0xb5}, {&(0x7f00000031c0)=""/4096, 0x1000}, {&(0x7f00000041c0)=""/109, 0x6d}, {&(0x7f0000004240)=""/43, 0x2b}, {&(0x7f0000004280)=""/172, 0xac}], 0x6, &(0x7f0000006280)=""/19, 0x13}, 0x2}, {{&(0x7f0000004400)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f00000049c0)=[{&(0x7f0000004480)=""/145, 0x91}, {&(0x7f0000004540)=""/89, 0x59}, {&(0x7f00000045c0)=""/252, 0xfc}, {&(0x7f00000046c0)=""/250, 0xfa}, {&(0x7f00000047c0)=""/80, 0x50}, {&(0x7f0000004840)=""/7, 0x7}, {&(0x7f0000004880)=""/82, 0x52}, {&(0x7f0000004900)=""/151, 0x97}], 0x8, &(0x7f0000004a40)=""/13, 0xd}}], 0x9, 0x1, &(0x7f0000004cc0)={0x0, 0x989680}) sendmsg$xdp(r0, &(0x7f0000005fc0)={&(0x7f0000004d00)={0x2c, 0x6, r1, 0xa}, 0x10, &(0x7f0000005f80)=[{&(0x7f0000004d40)="2ebb2eb175d2984d7378942740368634daa24a056345d2725a05ddca7c7be8b17ed9af4e4ece8d29457929375924e6b8d00bd67b65e5bb620fb585ad8130aef4707a569166d4cc1b60e156c5685b3b88908362d817a8c1567427275e0e820120d74a83017b3effe3ef440e89b74c19a41280c4928873b9fb842b3df2165f956aa20de79f2ddc217d4a5267485e1e8dbfe2dea2708e30a2a326c58c51e672087ea80d24668591ba88eef3e0a9d8ebf0c77e6eeeada43cdfd411b325d59a5b7e7a43b6805269e1", 0xc6}, {&(0x7f0000004e40)="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", 0x1000}, {&(0x7f0000005e40)="a82bd36ab5891e5855f5eba49bbfd6a34764a547bf709a2eb902e2f007de8349be5cb9a3dc7e60535181f259eccc024154d76df345d4d5774836d766334623bcd0d256ab50d3d0e6f10c145de4", 0x4d}, {&(0x7f0000005ec0)="1e613e85fb771db83b375902635983877dc579e2a161840707034209893b4a4e2c5e47a1d8f0e3aad1282193d88cbbac001a9e43b96cd55ce8a04c3359c5d0d859901327b59ec7f3be4c5ef383a86bdd202149b6c7652d344ebd5e51311e6be7c1ea7bfdf2ec5db890fcc9070b28076e7826c95e3c7e96d65f91fe3e4052883fbc407c2d4da59ff0", 0x88}], 0x4, 0x0, 0x0, 0x20004000}, 0x40000) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000080)='./bus\x00', 0x0) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000006340)={0x0, 0x3, 0xfffffffeffffffff, 0x0, 0x0, [], [], [], 0x2, 0x101}) r5 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) ioctl$PPPIOCDISCONN(r5, 0x7439) lseek(r4, 0x0, 0x2) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000002540)='/dev/dlm_plock\x00', 0x400000, 0x0) fsetxattr$trusted_overlay_opaque(r3, &(0x7f00000019c0)='trusted.overlay.opaque\x00', &(0x7f0000002500)='y\x00', 0x2, 0x3) r6 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002580)='/dev/ashmem\x00', 0x2000000000400000, 0x0) sendfile(r4, r5, 0x0, 0x40d09) r7 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$IMSETDEVNAME(r5, 0x80184947, 0x0) socketpair$unix(0x1, 0x100000000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket$inet_udplite(0x2, 0x2, 0x88) r10 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x20012, r9, 0x0) ioctl$ASHMEM_SET_SIZE(r10, 0x40087703, 0x1) ioctl$ASHMEM_SET_NAME(r10, 0x41007701, &(0x7f0000000000)='/dev/ashmem\x00') mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x440000000002011, r10, 0x0) ioctl$int_in(r6, 0x5452, &(0x7f0000001980)=0x5) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r7, 0x0) sendmsg$xdp(r4, &(0x7f0000006100)={&(0x7f00000000c0)={0x2c, 0x5, r2, 0x11}, 0x10, &(0x7f00000060c0)=[{&(0x7f0000000100)="c94a4ad1caa07c58da95c1c3fad6d84339250cba391edaf9f74e7a074c8f716bfb30068b713af1ea3a4fb191e720d76615e04b23dc5ea7944763c24fbb202bb6ad3a8f1f0886e6ca3534d8e2a0eacaf561600817042d8ddf6b52e2fc00763582f6c8c941c3c57e05f24914a9c5", 0x6d}, {&(0x7f0000000180)="414e636400ca02cce105c956b07fa3f527b55ff81734dbbdc2c23909cc3704b60804805554841630537b08fd9a26b16c5d90cedd27ff3327a86f32847cd9d7486b8f7cee585e1e6426ac21b2f6e15dfd8b18474883ed626d728ae8a5f7e6113e4599438e7693b63ff1fa0346ff0c602a738413ed75bd64047d0991392f3275e186f5861f32366e33cf5ed349eff65706de67d7f4c7cd483d0ea6b2aea936ec56d9229a0898206b13867413069cc8e2a4f731bdc4f7392c0f9398302200b4427ab723c566cb2d6ff1848a", 0xca}, {&(0x7f0000006000)="6a7765921ad99d5c361eb60813ccd84ce68673cee90f794e4b943473600842982a09224a564cacb2c3043027cff82abb7110633bf8abb948a249c8c44f03b785440db21bc241bc51cccd4420b873bc9c85541b3e5e8cc52b5d57988e9518e55aa007eaa81519de3a31509f4fb5b98ef8114469a794e9d0408082bba46ee81426de5ddf4f6fd2857793a86c9185f4c38be6c508ceb33adb2110a80f6d8c292b5e63bc6e26e5e677e73c648f98820e2afc9dd453e9", 0xb4}], 0x3, 0x0, 0x0, 0x48011}, 0x80) [ 1825.525390][T12431] R13: 00000000004c6f8b R14: 00000000004dc748 R15: 0000000000000004 03:53:29 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1}) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r3 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000080)='cifs.spnego\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000140)='$/\x00', r3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:29 executing program 0 (fault-call:8 fault-nth:3): pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:29 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xffff0000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:29 executing program 1 (fault-call:14 fault-nth:1): sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 1825.657837][ T26] audit: type=1804 audit(2000001209.409:58): pid=12445 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir951395381/syzkaller.BD1K5J/2605/bus" dev="sda1" ino=16705 res=1 [ 1825.764249][T12457] FAULT_INJECTION: forcing a failure. [ 1825.764249][T12457] name failslab, interval 1, probability 0, space 0, times 0 [ 1825.775273][ T2490] block nbd4: Attempted send on invalid socket [ 1825.783371][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1825.795016][ T2490] block nbd4: Attempted send on invalid socket [ 1825.801606][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 [ 1825.824278][T12457] CPU: 0 PID: 12457 Comm: syz-executor.0 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1825.833428][T12457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1825.843498][T12457] Call Trace: [ 1825.846815][T12457] dump_stack+0x172/0x1f0 [ 1825.851177][T12457] should_fail.cold+0xa/0x15 [ 1825.855797][T12457] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1825.859618][T12460] FAULT_INJECTION: forcing a failure. [ 1825.859618][T12460] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1825.861630][T12457] ? ___might_sleep+0x163/0x280 [ 1825.879688][T12457] __should_failslab+0x121/0x190 [ 1825.884654][T12457] should_failslab+0x9/0x14 [ 1825.889178][T12457] kmem_cache_alloc_node+0x264/0x710 [ 1825.894493][T12457] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1825.899986][T12457] __alloc_skb+0xd5/0x5e0 [ 1825.904331][T12457] ? skb_trim+0x190/0x190 [ 1825.908711][T12457] ? __ip_append_data.isra.0+0x1c27/0x2dd0 [ 1825.914542][T12457] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 1825.920206][T12457] ? raw_destroy+0x30/0x30 [ 1825.924666][T12457] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 1825.931098][T12457] ? ipv4_mtu+0x2a9/0x400 [ 1825.935468][T12457] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1825.941729][T12457] ? ip_setup_cork+0x53b/0x870 [ 1825.946510][T12457] ? raw_destroy+0x30/0x30 [ 1825.950944][T12457] ip_append_data.part.0+0xf2/0x170 [ 1825.956157][T12457] ? raw_destroy+0x30/0x30 [ 1825.960603][T12457] ip_append_data+0x6e/0x90 [ 1825.965141][T12457] raw_sendmsg+0xbe6/0x2f20 [ 1825.969689][T12457] ? compat_raw_getsockopt+0x100/0x100 [ 1825.975171][T12457] ? mark_held_locks+0xa4/0xf0 [ 1825.979965][T12457] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1825.985283][T12457] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1825.990807][T12457] ? ___might_sleep+0x163/0x280 [ 1825.995697][T12457] ? __might_sleep+0x95/0x190 [ 1826.000404][T12457] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1826.006068][T12457] ? aa_sk_perm+0x288/0x880 [ 1826.010680][T12457] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1826.016180][T12457] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1826.021862][T12457] inet_sendmsg+0x147/0x5e0 [ 1826.026399][T12457] ? compat_raw_getsockopt+0x100/0x100 [ 1826.031896][T12457] ? inet_sendmsg+0x147/0x5e0 [ 1826.036594][T12457] ? ipip_gro_receive+0x100/0x100 [ 1826.041650][T12457] sock_sendmsg+0xdd/0x130 [ 1826.046089][T12457] kernel_sendmsg+0x44/0x50 [ 1826.050643][T12457] sock_no_sendpage+0x116/0x150 [ 1826.055541][T12457] ? sock_kfree_s+0x70/0x70 [ 1826.060071][T12457] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1826.065409][T12457] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1826.070903][T12457] inet_sendpage+0x44a/0x630 [ 1826.075519][T12457] kernel_sendpage+0x95/0xf0 [ 1826.080210][T12457] ? inet_sendmsg+0x5e0/0x5e0 [ 1826.084912][T12457] sock_sendpage+0x8b/0xc0 [ 1826.089362][T12457] pipe_to_sendpage+0x299/0x370 [ 1826.094241][T12457] ? kernel_sendpage+0xf0/0xf0 [ 1826.099113][T12457] ? direct_splice_actor+0x1a0/0x1a0 [ 1826.104438][T12457] ? __splice_from_pipe+0x245/0x7d0 [ 1826.109665][T12457] __splice_from_pipe+0x395/0x7d0 [ 1826.114728][T12457] ? direct_splice_actor+0x1a0/0x1a0 [ 1826.120058][T12457] ? direct_splice_actor+0x1a0/0x1a0 [ 1826.125394][T12457] splice_from_pipe+0x108/0x170 [ 1826.130290][T12457] ? splice_shrink_spd+0xd0/0xd0 [ 1826.135255][T12457] ? retint_kernel+0x2d/0x2d [ 1826.139872][T12457] generic_splice_sendpage+0x3c/0x50 [ 1826.145181][T12457] ? splice_from_pipe+0x170/0x170 [ 1826.150232][T12457] do_splice+0x70a/0x13c0 [ 1826.154592][T12457] ? opipe_prep.part.0+0x2d0/0x2d0 [ 1826.159733][T12457] ? __fget_light+0x1a9/0x230 [ 1826.164469][T12457] __x64_sys_splice+0x2c6/0x330 [ 1826.169357][T12457] do_syscall_64+0x103/0x610 [ 1826.173984][T12457] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1826.179911][T12457] RIP: 0033:0x458209 [ 1826.183819][T12457] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1826.203697][T12457] RSP: 002b:00007efd8c210c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 1826.212127][T12457] RAX: ffffffffffffffda RBX: 00007efd8c210c90 RCX: 0000000000458209 [ 1826.220200][T12457] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 1826.228282][T12457] RBP: 000000000073bfa0 R08: 0000000000810003 R09: 000000000000000b [ 1826.236278][T12457] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efd8c2116d4 [ 1826.244262][T12457] R13: 00000000004c6fdc R14: 00000000004dbc20 R15: 0000000000000007 [ 1826.252284][T12460] CPU: 1 PID: 12460 Comm: syz-executor.1 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1826.261427][T12460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1826.271497][T12460] Call Trace: 03:53:30 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xfffff000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1826.274812][T12460] dump_stack+0x172/0x1f0 [ 1826.279188][T12460] should_fail.cold+0xa/0x15 [ 1826.283795][T12460] ? _kstrtoull+0x14c/0x200 [ 1826.288320][T12460] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1826.294190][T12460] ? __lock_acquire+0x548/0x3fb0 [ 1826.299638][T12460] ? lock_downgrade+0x880/0x880 [ 1826.304601][T12460] should_fail_alloc_page+0x50/0x60 [ 1826.309823][T12460] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1826.315213][T12460] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1826.320931][T12460] ? find_held_lock+0x35/0x130 [ 1826.327058][T12460] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1826.332953][T12460] cache_grow_begin+0x9c/0x860 [ 1826.337734][T12460] ? getname_flags+0xd6/0x5b0 [ 1826.342575][T12460] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1826.348863][T12460] kmem_cache_alloc+0x62d/0x6f0 [ 1826.353714][T12460] ? apparmor_capable+0x2ed/0x630 [ 1826.358764][T12460] ? cap_capable+0x205/0x270 [ 1826.363409][T12460] getname_flags+0xd6/0x5b0 [ 1826.367911][T12460] user_path_mountpoint_at+0x29/0x50 [ 1826.373207][T12460] ksys_umount+0x167/0xf00 [ 1826.377650][T12460] ? ksys_write+0x166/0x1f0 [ 1826.382265][T12460] ? __detach_mounts+0x320/0x320 [ 1826.387212][T12460] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1826.392688][T12460] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1826.398175][T12460] ? do_syscall_64+0x26/0x610 [ 1826.402871][T12460] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1826.408936][T12460] ? do_syscall_64+0x26/0x610 [ 1826.413614][T12460] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1826.418903][T12460] __x64_sys_umount+0x54/0x80 [ 1826.423578][T12460] do_syscall_64+0x103/0x610 [ 1826.428166][T12460] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1826.434050][T12460] RIP: 0033:0x458209 [ 1826.437936][T12460] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1826.457529][T12460] RSP: 002b:00007fc015596c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [ 1826.465952][T12460] RAX: ffffffffffffffda RBX: 00007fc015596c90 RCX: 0000000000458209 [ 1826.473919][T12460] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000800 [ 1826.481919][T12460] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1826.489906][T12460] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc0155976d4 [ 1826.497883][T12460] R13: 00000000004c6f8b R14: 00000000004dc748 R15: 0000000000000004 [ 1826.513694][ T26] audit: type=1804 audit(2000001210.269:59): pid=12461 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir951395381/syzkaller.BD1K5J/2605/bus" dev="sda1" ino=16705 res=1 [ 1826.562342][ T26] audit: type=1804 audit(2000001210.269:60): pid=12445 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir951395381/syzkaller.BD1K5J/2605/bus" dev="sda1" ino=16705 res=1 [ 1826.652951][ T2490] block nbd4: Attempted send on invalid socket [ 1826.659576][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1826.670364][ T2490] block nbd4: Attempted send on invalid socket [ 1826.676813][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:53:31 executing program 0 (fault-call:8 fault-nth:4): pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:31 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:31 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) socket$packet(0x11, 0x3, 0x300) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x100) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f0000000100)) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000000040)={0x4, 0x0, 0x0, 0x1, 0xe8}) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:53:31 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x3008000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x68, r3, 0x100, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3a}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x8}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1bd47a3c}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x40095) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, &(0x7f0000000200)={0x37ee, {{0x2, 0x4e20, @local}}}, 0x88) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:31 executing program 1 (fault-call:14 fault-nth:2): sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:53:31 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xfffffdf9}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:31 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xfffffe00}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1827.791064][T12489] FAULT_INJECTION: forcing a failure. [ 1827.791064][T12489] name failslab, interval 1, probability 0, space 0, times 0 [ 1827.804074][T12489] CPU: 1 PID: 12489 Comm: syz-executor.0 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1827.813241][T12489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1827.823313][T12489] Call Trace: [ 1827.826635][T12489] dump_stack+0x172/0x1f0 [ 1827.831023][T12489] should_fail.cold+0xa/0x15 [ 1827.835632][T12489] ? fault_create_debugfs_attr+0x1e0/0x1e0 03:53:31 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 1827.841463][T12489] ? ___might_sleep+0x163/0x280 [ 1827.846333][T12489] __should_failslab+0x121/0x190 [ 1827.851266][T12489] should_failslab+0x9/0x14 [ 1827.855822][T12489] kmem_cache_alloc_node_trace+0x270/0x720 [ 1827.861682][T12489] __kmalloc_node_track_caller+0x3d/0x70 [ 1827.867352][T12489] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1827.872735][T12489] __alloc_skb+0x10b/0x5e0 [ 1827.877209][T12489] ? skb_trim+0x190/0x190 [ 1827.881536][T12489] ? raw_getfrag+0x164/0x230 [ 1827.886178][T12489] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 1827.891906][T12489] ? raw_destroy+0x30/0x30 [ 1827.896344][T12489] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1827.902598][T12489] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 1827.909023][T12489] ? ipv4_mtu+0x2a9/0x400 [ 1827.913372][T12489] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1827.919613][T12489] ? ip_setup_cork+0x53b/0x870 [ 1827.924416][T12489] ? raw_destroy+0x30/0x30 [ 1827.928859][T12489] ip_append_data.part.0+0xf2/0x170 [ 1827.934139][T12489] ? raw_destroy+0x30/0x30 [ 1827.938571][T12489] ip_append_data+0x6e/0x90 [ 1827.943075][T12489] raw_sendmsg+0xbe6/0x2f20 [ 1827.947608][T12489] ? compat_raw_getsockopt+0x100/0x100 [ 1827.953204][T12489] ? process_measurement+0xd5d/0x1570 [ 1827.958594][T12489] ? process_measurement+0xd5d/0x1570 [ 1827.963992][T12489] ? ___might_sleep+0x163/0x280 [ 1827.968890][T12489] ? __might_sleep+0x95/0x190 [ 1827.973927][T12489] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1827.979582][T12489] ? aa_sk_perm+0x288/0x880 [ 1827.984094][T12489] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1827.989677][T12489] inet_sendmsg+0x147/0x5e0 [ 1827.994181][T12489] ? compat_raw_getsockopt+0x100/0x100 [ 1827.999664][T12489] ? inet_sendmsg+0x147/0x5e0 [ 1828.004362][T12489] ? ipip_gro_receive+0x100/0x100 [ 1828.009392][T12489] sock_sendmsg+0xdd/0x130 [ 1828.013812][T12489] kernel_sendmsg+0x44/0x50 [ 1828.018352][T12489] sock_no_sendpage+0x116/0x150 [ 1828.023220][T12489] ? sock_kfree_s+0x70/0x70 [ 1828.027950][T12489] inet_sendpage+0x44a/0x630 [ 1828.032575][T12489] kernel_sendpage+0x95/0xf0 [ 1828.037167][T12489] ? inet_sendmsg+0x5e0/0x5e0 [ 1828.041851][T12489] sock_sendpage+0x8b/0xc0 [ 1828.046373][T12489] ? pipe_lock+0x6e/0x80 [ 1828.050642][T12489] pipe_to_sendpage+0x299/0x370 [ 1828.055588][T12489] ? kernel_sendpage+0xf0/0xf0 [ 1828.060442][T12489] ? direct_splice_actor+0x1a0/0x1a0 [ 1828.065826][T12489] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1828.072080][T12489] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 1828.078213][T12489] __splice_from_pipe+0x395/0x7d0 [ 1828.083269][T12489] ? direct_splice_actor+0x1a0/0x1a0 [ 1828.088648][T12489] ? direct_splice_actor+0x1a0/0x1a0 [ 1828.093931][T12489] splice_from_pipe+0x108/0x170 [ 1828.098783][T12489] ? splice_shrink_spd+0xd0/0xd0 [ 1828.103738][T12489] ? apparmor_file_permission+0x25/0x30 [ 1828.109332][T12489] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1828.115600][T12489] ? security_file_permission+0x94/0x380 [ 1828.121256][T12489] generic_splice_sendpage+0x3c/0x50 [ 1828.126555][T12489] ? splice_from_pipe+0x170/0x170 [ 1828.131581][T12489] do_splice+0x70a/0x13c0 [ 1828.135963][T12489] ? opipe_prep.part.0+0x2d0/0x2d0 [ 1828.141081][T12489] ? __fget_light+0x1a9/0x230 [ 1828.145953][T12489] __x64_sys_splice+0x2c6/0x330 [ 1828.150827][T12489] do_syscall_64+0x103/0x610 [ 1828.155429][T12489] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1828.161324][T12489] RIP: 0033:0x458209 [ 1828.165230][T12489] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1828.184840][T12489] RSP: 002b:00007efd8c210c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 1828.194961][T12489] RAX: ffffffffffffffda RBX: 00007efd8c210c90 RCX: 0000000000458209 [ 1828.202924][T12489] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 1828.210885][T12489] RBP: 000000000073bfa0 R08: 0000000000810003 R09: 000000000000000b [ 1828.219382][T12489] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efd8c2116d4 [ 1828.227387][T12489] R13: 00000000004c6fdc R14: 00000000004dbc20 R15: 0000000000000007 03:53:32 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 03:53:32 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xffffff7f}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1828.282309][ T2490] block nbd4: Attempted send on invalid socket [ 1828.288741][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1828.296838][ T2490] block nbd4: Attempted send on invalid socket [ 1828.303258][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:53:32 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x7) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x14, r0, 0x0) 03:53:32 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x2) 03:53:32 executing program 0 (fault-call:8 fault-nth:5): pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) [ 1828.731874][T12522] FAULT_INJECTION: forcing a failure. [ 1828.731874][T12522] name failslab, interval 1, probability 0, space 0, times 0 [ 1828.744740][T12522] CPU: 0 PID: 12522 Comm: syz-executor.0 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1828.753848][T12522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1828.753856][T12522] Call Trace: [ 1828.753883][T12522] dump_stack+0x172/0x1f0 [ 1828.753908][T12522] should_fail.cold+0xa/0x15 [ 1828.767380][T12522] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1828.782124][T12522] ? ___might_sleep+0x163/0x280 [ 1828.789297][T12522] __should_failslab+0x121/0x190 [ 1828.794274][T12522] should_failslab+0x9/0x14 [ 1828.798781][T12522] kmem_cache_alloc_node+0x264/0x710 [ 1828.804078][T12522] ? ip_generic_getfrag+0x120/0x230 [ 1828.809291][T12522] __alloc_skb+0xd5/0x5e0 [ 1828.813645][T12522] ? skb_trim+0x190/0x190 [ 1828.817990][T12522] ? raw_getfrag+0x164/0x230 [ 1828.822601][T12522] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1828.828334][T12522] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 1828.834068][T12522] ? raw_destroy+0x30/0x30 [ 1828.838511][T12522] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 1828.844912][T12522] ? ipv4_mtu+0x2a9/0x400 [ 1828.849227][T12522] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1828.855458][T12522] ? ip_setup_cork+0x53b/0x870 [ 1828.860217][T12522] ? raw_destroy+0x30/0x30 [ 1828.864641][T12522] ip_append_data.part.0+0xf2/0x170 [ 1828.869835][T12522] ? raw_destroy+0x30/0x30 [ 1828.874256][T12522] ip_append_data+0x6e/0x90 [ 1828.878750][T12522] raw_sendmsg+0xbe6/0x2f20 [ 1828.883255][T12522] ? compat_raw_getsockopt+0x100/0x100 [ 1828.888701][T12522] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1828.894190][T12522] ? process_measurement+0xd5d/0x1570 [ 1828.899563][T12522] ? process_measurement+0xd5d/0x1570 [ 1828.904932][T12522] ? ___might_sleep+0x163/0x280 [ 1828.911528][T12522] ? __might_sleep+0x95/0x190 [ 1828.920965][T12522] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1828.926594][T12522] ? aa_sk_perm+0x288/0x880 [ 1828.931092][T12522] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1828.936641][T12522] inet_sendmsg+0x147/0x5e0 [ 1828.941220][T12522] ? compat_raw_getsockopt+0x100/0x100 [ 1828.946677][T12522] ? inet_sendmsg+0x147/0x5e0 [ 1828.951382][T12522] ? ipip_gro_receive+0x100/0x100 [ 1828.956409][T12522] sock_sendmsg+0xdd/0x130 [ 1828.960818][T12522] kernel_sendmsg+0x44/0x50 [ 1828.965314][T12522] sock_no_sendpage+0x116/0x150 [ 1828.970153][T12522] ? sock_kfree_s+0x70/0x70 [ 1828.974843][T12522] ? trace_hardirqs_on_caller+0x6a/0x220 [ 1828.980481][T12522] ? retint_kernel+0x2d/0x2d [ 1828.985156][T12522] inet_sendpage+0x44a/0x630 [ 1828.989768][T12522] kernel_sendpage+0x95/0xf0 [ 1828.994345][T12522] ? inet_sendmsg+0x5e0/0x5e0 [ 1828.999013][T12522] sock_sendpage+0x8b/0xc0 [ 1829.003435][T12522] ? pipe_lock+0x6e/0x80 [ 1829.007682][T12522] pipe_to_sendpage+0x299/0x370 [ 1829.012542][T12522] ? kernel_sendpage+0xf0/0xf0 [ 1829.017298][T12522] ? direct_splice_actor+0x1a0/0x1a0 [ 1829.022572][T12522] ? trace_hardirqs_on_caller+0x6a/0x220 [ 1829.028221][T12522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1829.034456][T12522] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 1829.040521][T12522] __splice_from_pipe+0x395/0x7d0 [ 1829.045537][T12522] ? direct_splice_actor+0x1a0/0x1a0 [ 1829.050825][T12522] ? direct_splice_actor+0x1a0/0x1a0 [ 1829.056112][T12522] splice_from_pipe+0x108/0x170 [ 1829.060959][T12522] ? splice_shrink_spd+0xd0/0xd0 [ 1829.065891][T12522] ? apparmor_file_permission+0x25/0x30 [ 1829.071429][T12522] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1829.077663][T12522] ? security_file_permission+0x94/0x380 [ 1829.083295][T12522] generic_splice_sendpage+0x3c/0x50 [ 1829.088673][T12522] ? splice_from_pipe+0x170/0x170 [ 1829.093703][T12522] do_splice+0x70a/0x13c0 [ 1829.098045][T12522] ? opipe_prep.part.0+0x2d0/0x2d0 [ 1829.103149][T12522] ? __fget_light+0x1a9/0x230 [ 1829.107820][T12522] __x64_sys_splice+0x2c6/0x330 [ 1829.112755][T12522] do_syscall_64+0x103/0x610 [ 1829.117339][T12522] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1829.123215][T12522] RIP: 0033:0x458209 [ 1829.127098][T12522] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1829.146697][T12522] RSP: 002b:00007efd8c210c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 1829.155096][T12522] RAX: ffffffffffffffda RBX: 00007efd8c210c90 RCX: 0000000000458209 [ 1829.163053][T12522] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 1829.171011][T12522] RBP: 000000000073bfa0 R08: 0000000000810003 R09: 000000000000000b [ 1829.178971][T12522] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efd8c2116d4 [ 1829.186949][T12522] R13: 00000000004c6fdc R14: 00000000004dbc20 R15: 0000000000000007 [ 1829.737832][ C1] net_ratelimit: 22 callbacks suppressed [ 1829.737840][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1829.749371][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1830.627797][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1830.633634][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:53:34 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:34 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xffffff8c}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:34 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x1fffff, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) remap_file_pages(&(0x7f0000701000/0x3000)=nil, 0x3000, 0x1000000, 0xff, 0x20000) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x2000101000, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f0000000380)={0x5, 0x0, 0x9}) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r2, 0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000000c0)='eth0bdevtrusted-\x00', 0xffffffffffffffff}, 0x30) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000200)) getsockname(r1, &(0x7f00000004c0)=@can={0x1d, 0x0}, &(0x7f0000000440)=0x80) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000540)={@rand_addr=0x1, @dev={0xac, 0x14, 0x14, 0xe}, r4}, 0xc) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000400)="d8c281501c8e38d21d286d9e0c77da632f16") io_setup(0x7fffffff, &(0x7f0000000000)) r5 = syz_open_dev$vcsn(&(0x7f0000000480)='/dev/vcs#\x00', 0x4, 0x10610200) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x10) ptrace$pokeuser(0x6, r3, 0x5, 0xffffffff) ioctl$PPPIOCGCHAN(r5, 0x80047437, &(0x7f00000003c0)) ioctl$SG_GET_COMMAND_Q(r5, 0x2270, &(0x7f0000000100)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000580)='/dev/urandom\x00', 0x602, 0x0) r6 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$KVM_S390_VCPU_FAULT(r6, 0x4008ae52, &(0x7f0000000040)=0x4) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x1) 03:53:34 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) write$binfmt_script(r1, &(0x7f0000000140)={'#! ', './file0', [{0x20, '\\{'}, {}], 0xa, "0b35281de40b8e8c61112aebd8ab6fc84d938618e05b14bcef8831035470ba533f8bdaad645c9b3328804d52e1b44c32365b81ba0d60fb639b566f7119c86af4b6786c2013311c479ced72ce1014b44de0a6d6a9cf9314ae9653a76cdbdc6b0deca829667bb5e5af2f67c0a479e946e7fe772612a1f671a8f2ca213f"}, 0x8b) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:34 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x8000a0) 03:53:34 executing program 0 (fault-call:8 fault-nth:6): pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) [ 1830.697830][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1830.703652][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1830.709508][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1830.715264][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1830.721140][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1830.726901][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:53:34 executing program 3: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f0000000000)={0x9, 0x20, {0x52, 0x83d, 0x7, {0x99d0, 0x7}, {0x800, 0x8c}, @cond=[{0x0, 0x6, 0x6, 0x8, 0x7, 0x3}, {0x8000, 0xffffffffffffa1fd, 0x0, 0x1, 0x6, 0x9ca}]}, {0x57, 0x1000, 0x101, {0x80000000, 0x6}, {0x4, 0x7fffffff}, @cond=[{0x6, 0x7f, 0x1, 0xff, 0x5, 0x7fffffff}, {0x4, 0x9, 0x9, 0x3, 0x4, 0x2}]}}) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x9) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2, 0x11, r0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x3) 03:53:34 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xfffffff4}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1830.866322][T12537] FAULT_INJECTION: forcing a failure. [ 1830.866322][T12537] name failslab, interval 1, probability 0, space 0, times 0 [ 1830.880521][T12537] CPU: 1 PID: 12537 Comm: syz-executor.0 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1830.889915][T12537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1830.899987][T12537] Call Trace: [ 1830.903394][T12537] dump_stack+0x172/0x1f0 [ 1830.907749][T12537] should_fail.cold+0xa/0x15 [ 1830.912375][T12537] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1830.918189][T12537] ? ___might_sleep+0x163/0x280 [ 1830.923073][T12537] __should_failslab+0x121/0x190 [ 1830.928014][T12537] should_failslab+0x9/0x14 [ 1830.932533][T12537] kmem_cache_alloc_node_trace+0x270/0x720 [ 1830.938366][T12537] __kmalloc_node_track_caller+0x3d/0x70 [ 1830.944018][T12537] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1830.949392][T12537] __alloc_skb+0x10b/0x5e0 [ 1830.953792][T12537] ? skb_trim+0x190/0x190 [ 1830.958107][T12537] ? raw_getfrag+0x164/0x230 [ 1830.962684][T12537] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1830.968391][T12537] __ip_append_data.isra.0+0x24d6/0x2dd0 [ 1830.974012][T12537] ? raw_destroy+0x30/0x30 [ 1830.978503][T12537] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1830.984822][T12537] ? __ip_flush_pending_frames.isra.0+0x2d0/0x2d0 [ 1830.991227][T12537] ? ipv4_mtu+0x2a9/0x400 [ 1830.995579][T12537] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1831.001820][T12537] ? ip_setup_cork+0x53b/0x870 [ 1831.006567][T12537] ? raw_destroy+0x30/0x30 [ 1831.010967][T12537] ip_append_data.part.0+0xf2/0x170 [ 1831.016158][T12537] ? raw_destroy+0x30/0x30 [ 1831.020567][T12537] ip_append_data+0x6e/0x90 [ 1831.025082][T12537] raw_sendmsg+0xbe6/0x2f20 [ 1831.029592][T12537] ? compat_raw_getsockopt+0x100/0x100 [ 1831.035044][T12537] ? process_measurement+0xd5d/0x1570 [ 1831.040399][T12537] ? process_measurement+0xd5d/0x1570 [ 1831.045772][T12537] ? ___might_sleep+0x163/0x280 [ 1831.050622][T12537] ? __might_sleep+0x95/0x190 [ 1831.055285][T12537] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1831.060900][T12537] ? aa_sk_perm+0x288/0x880 [ 1831.065393][T12537] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1831.070951][T12537] inet_sendmsg+0x147/0x5e0 [ 1831.076073][T12537] ? compat_raw_getsockopt+0x100/0x100 [ 1831.081533][T12537] ? inet_sendmsg+0x147/0x5e0 [ 1831.086218][T12537] ? ipip_gro_receive+0x100/0x100 [ 1831.091238][T12537] sock_sendmsg+0xdd/0x130 [ 1831.095679][T12537] kernel_sendmsg+0x44/0x50 [ 1831.100182][T12537] sock_no_sendpage+0x116/0x150 [ 1831.105023][T12537] ? sock_kfree_s+0x70/0x70 [ 1831.109520][T12537] inet_sendpage+0x44a/0x630 [ 1831.114096][T12537] kernel_sendpage+0x95/0xf0 [ 1831.118691][T12537] ? inet_sendmsg+0x5e0/0x5e0 [ 1831.123354][T12537] sock_sendpage+0x8b/0xc0 [ 1831.127753][T12537] ? pipe_lock+0x6e/0x80 [ 1831.131984][T12537] pipe_to_sendpage+0x299/0x370 [ 1831.136819][T12537] ? kernel_sendpage+0xf0/0xf0 [ 1831.141581][T12537] ? direct_splice_actor+0x1a0/0x1a0 [ 1831.146869][T12537] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1831.153095][T12537] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 1831.159182][T12537] __splice_from_pipe+0x395/0x7d0 [ 1831.164191][T12537] ? direct_splice_actor+0x1a0/0x1a0 [ 1831.169502][T12537] ? direct_splice_actor+0x1a0/0x1a0 [ 1831.174789][T12537] splice_from_pipe+0x108/0x170 [ 1831.179627][T12537] ? splice_shrink_spd+0xd0/0xd0 [ 1831.184555][T12537] ? apparmor_file_permission+0x25/0x30 [ 1831.190086][T12537] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1831.196436][T12537] ? security_file_permission+0x94/0x380 [ 1831.202055][T12537] generic_splice_sendpage+0x3c/0x50 [ 1831.207358][T12537] ? splice_from_pipe+0x170/0x170 [ 1831.212478][T12537] do_splice+0x70a/0x13c0 [ 1831.217020][T12537] ? opipe_prep.part.0+0x2d0/0x2d0 [ 1831.222150][T12537] ? __fget_light+0x1a9/0x230 [ 1831.226961][T12537] __x64_sys_splice+0x2c6/0x330 [ 1831.231898][T12537] do_syscall_64+0x103/0x610 [ 1831.236478][T12537] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1831.242363][T12537] RIP: 0033:0x458209 [ 1831.246343][T12537] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1831.265967][T12537] RSP: 002b:00007efd8c210c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 1831.274372][T12537] RAX: ffffffffffffffda RBX: 00007efd8c210c90 RCX: 0000000000458209 [ 1831.282352][T12537] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 1831.290476][T12537] RBP: 000000000073bfa0 R08: 0000000000810003 R09: 000000000000000b [ 1831.298436][T12537] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efd8c2116d4 [ 1831.306389][T12537] R13: 00000000004c6fdc R14: 00000000004dbc20 R15: 0000000000000007 03:53:35 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ashmem\x00', 0x401, 0x0) vmsplice(r0, &(0x7f0000002280)=[{&(0x7f00000001c0)="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", 0x1000}, {&(0x7f0000000000)="3ca180b91559e9", 0x7}, {&(0x7f00000011c0)="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", 0x1000}, {&(0x7f00000000c0)="5894a981c38cb0d7c66ff3e6e533ba167938ada54e88b92eb9f32716ed69019294fa86f9a50db0c0a0acd90cb91fb39fcd59213c26a9991d87fd786e0e701ae3c0bd0b457144fd7bfae479495a452e78f5d3124585c4581830017c59901bde4e60fa3200e0ba523e193b341ddca6", 0x6e}, {&(0x7f0000000140)="007b7bdaca2a9c83c9bdb0cc32fea1f6653f5cc8385b78c109c016e2c88ba7b232fdadb32e", 0x25}, {&(0x7f00000021c0)="35acbe0a345cc35cfc7e58c02da24b41c7d16ab3f2c56dc6fa4c8f09e0644ff2f299eaf3e114ebc3be1267a4578f35355ec5f7d8a00ae40d34cad864dc25fb8219b14d7f7b1b114efa8af81f22aa1add6bc21c5b2688d85383bb26bd579a17736f2485360db836cfcda7e5e9af6d6536c0062ce15f59e4de96f85457aefe94c03e4968f915ee0536389325fbe57d436fbd51c4a62ef763eb11ffcf54765a7d1ead58", 0xa2}], 0x6, 0x5) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000003980)={{{@in6=@loopback, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@remote}}, &(0x7f0000003a80)=0xe8) syz_mount_image$reiserfs(&(0x7f0000002300)='reiserfs\x00', &(0x7f0000002340)='./file0\x00', 0x5, 0x9, &(0x7f0000003880)=[{&(0x7f0000002380)="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", 0xfb, 0x1000}, {&(0x7f0000002480)="195f626cf4f51e4061e7cb6dabf9ad9bcc691df302668613b987584d1944f51629a177870d4e22e678dd6284a0bdbed34488f5acb3f9f119eb8cea431eee52509bc1cd5476903569a85550377dc4e1988bdf5e55f9ec490733341fc8e53c70e3260b0fc0f706979f3fb1ac7c805e0c556802e9aa8cd79909673efe4c8385c9d02d41d9b426f9698b4c8ba6fe6f2ae89541262b497e5428e6b92c5edf002e25178524c93fc4c434b8df589d1d9472b949ec8bd62dd88a40f76b64948a57951bf53935ca9ac3621507a0124b302a4e273f137431ee738ab2f51ca69897", 0xdc, 0x94}, {&(0x7f0000002580)="7f7d5b0e67b498e9997b32a54b7a89ab21885abacf5cd49b8c40b9b8ed4449e5a50d7e5b3592475d26be6ae34641c2c5d9d4b538b63e7a6b40baebe4356333e2079dbea7de833ecb5db3b368ee47a57e703a33e64732d9de1ddb6b2b698517a320e512d59bd2d3343fee5c6216b8541a22489a728950721da99e64d04b27af62d4f82c12f9933504083efb6d4417cb4ee4f8", 0x92, 0x7}, {&(0x7f0000002640)="c98891f50243ce4ca1e9cd02c3cf17d6a81b8e109d8629d3967a6b400bf0e5243b7e9951f19e9db2751780bdb9821fe3d9d7962b3d807668d1e584a287bc0fada69e56ef5b54a1e177041bedbc7cd05e05ac02bb5d220dea6f45e66627fd57b6cf37889467df64264531a0cdded91a9dd06e68f046e6a14ee07d38fe59db116bb49b54e05d9802a8405ce464c2a1fd9e2b8b90719dbb9c2e33b82534d0ab393e743cc330aee768", 0xa7, 0x9d6}, {&(0x7f0000002700)="5132acd161438b0c531e1d01db9240e1d2ca1090da556fe2d36348a6a628b1437a6796f45553d435bc6d8b925cde1c07bcc482ad4a3962aa823df6fc6bca446acdee3f2a16e8e8b1b36a47", 0x4b, 0x3}, {&(0x7f0000002780)="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", 0x1000, 0x8}, {&(0x7f0000003780)="e1f89d6ccfba4d05115719da6dd62508a3ff2315e10cd2e42f8f96a193d38df27d632271f5", 0x25, 0x3}, {&(0x7f00000037c0)="594f577b4ca9187fdef6dffc1979613fb66648c2fe47867a2bd75c544c95ccd4ce248df353e5eccc4bbe733c30bcbe3511576f4a6200f79f24e0608b424befae0cc162680e463de815de2864f4febde31eb442fc875461be34f53b7a7a66a938e4bde54a6e9ab79fce16cc1778404e082c3f40b2a2b955152a2bb3fb13", 0x7d, 0x1}, {&(0x7f0000003840)="e6ecfe3d956ed285e91fe475157172b7e98b0da65f07c49b318127b32e968c82", 0x20, 0x1ff}], 0xcc400, &(0x7f0000003ac0)={[{@data_journal='data=journal'}, {@data_writeback='data=writeback'}, {@acl='acl'}, {@noattrs='noattrs'}, {@acl='acl'}], [{@euid_gt={'euid>', r1}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) r2 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xfffffffffffffff7, 0x2000) ioctl$PPPIOCCONNECT(r2, 0x4004743a, &(0x7f0000000080)=0x400fffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) 03:53:35 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x1000000) 03:53:35 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xfffffff5}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:35 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xfffffff6}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:37 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:37 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x3) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x2000000, 0x880) ioctl$KVM_SET_FPU(r1, 0x41a0ae8d, &(0x7f00000000c0)={[], 0x0, 0x1000, 0x58b, 0x0, 0x3, 0xd000, 0x2000, [], 0x7231}) 03:53:37 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$kcm(0x29, 0x0, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000000)=0x2) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pause() splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) getpeername$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) recvfrom$packet(r0, &(0x7f0000000140)=""/127, 0x7f, 0x0, &(0x7f0000000200)={0x11, 0x11, r3, 0x1, 0x1, 0x6, @broadcast}, 0x14) 03:53:37 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xfffffffb}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:37 executing program 0 (fault-call:8 fault-nth:7): pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:37 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x2000000) 03:53:37 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xfffffffe}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:37 executing program 3: r0 = socket$inet(0x2, 0x4, 0x400000000000000) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000000040)=0x10) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L-', 0x9}, 0x28, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000180)=[@in6={0xa, 0x4e22, 0x3, @loopback, 0x8}, @in={0x2, 0x4e21, @empty}, @in6={0xa, 0x4e24, 0x100000000, @mcast1, 0x3dcc}, @in={0x2, 0x4e20, @remote}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e24, 0x3, @local, 0x7ff}, @in6={0xa, 0x4e21, 0x8, @remote, 0x8001}, @in={0x2, 0x4e22, @multicast2}], 0xc0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) [ 1833.927024][T12594] FAULT_INJECTION: forcing a failure. [ 1833.927024][T12594] name failslab, interval 1, probability 0, space 0, times 0 03:53:37 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x8cffffff) [ 1833.996880][T12594] CPU: 1 PID: 12594 Comm: syz-executor.0 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1834.006026][T12594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1834.016112][T12594] Call Trace: [ 1834.019432][T12594] dump_stack+0x172/0x1f0 [ 1834.023790][T12594] should_fail.cold+0xa/0x15 [ 1834.028388][T12594] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1834.034180][T12594] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1834.039644][T12594] __should_failslab+0x121/0x190 [ 1834.044588][T12594] should_failslab+0x9/0x14 [ 1834.049081][T12594] kmem_cache_alloc+0x47/0x6f0 [ 1834.053869][T12594] __nf_conntrack_alloc+0xdb/0x680 [ 1834.059177][T12594] init_conntrack.isra.0+0xe2c/0x1170 [ 1834.064886][T12594] ? nf_conntrack_alloc+0x50/0x50 [ 1834.069942][T12594] nf_conntrack_in+0xd93/0x1410 [ 1834.074802][T12594] ? nf_conntrack_update+0x960/0x960 [ 1834.080072][T12594] ? __do_replace+0x910/0x910 [ 1834.084795][T12594] ? ipv4_conntrack_defrag+0x1b5/0x5e0 [ 1834.090366][T12594] ipv4_conntrack_local+0x169/0x210 [ 1834.095565][T12594] nf_hook_slow+0xbf/0x1f0 [ 1834.099982][T12594] __ip_local_out+0x403/0x880 [ 1834.104651][T12594] ? ip_finish_output+0xd50/0xd50 [ 1834.109657][T12594] ? __ip_make_skb+0xf15/0x1820 [ 1834.114491][T12594] ? ip_append_data.part.0+0x170/0x170 [ 1834.119941][T12594] ? dst_release+0x62/0xb0 [ 1834.124363][T12594] ? __ip_make_skb+0xf93/0x1820 [ 1834.129215][T12594] ip_local_out+0x2d/0x1b0 [ 1834.133616][T12594] ip_send_skb+0x42/0xf0 [ 1834.137852][T12594] ip_push_pending_frames+0x64/0x80 [ 1834.143035][T12594] raw_sendmsg+0x1e6d/0x2f20 [ 1834.147615][T12594] ? compat_raw_getsockopt+0x100/0x100 [ 1834.153059][T12594] ? process_measurement+0xd5d/0x1570 [ 1834.158420][T12594] ? mark_held_locks+0xa4/0xf0 [ 1834.163171][T12594] ? ___might_sleep+0x163/0x280 [ 1834.168104][T12594] ? __might_sleep+0x95/0x190 [ 1834.172790][T12594] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1834.178405][T12594] ? aa_sk_perm+0x288/0x880 [ 1834.182895][T12594] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1834.188431][T12594] inet_sendmsg+0x147/0x5e0 [ 1834.193927][T12594] ? compat_raw_getsockopt+0x100/0x100 [ 1834.199374][T12594] ? inet_sendmsg+0x147/0x5e0 [ 1834.204910][T12594] ? ipip_gro_receive+0x100/0x100 [ 1834.209948][T12594] sock_sendmsg+0xdd/0x130 [ 1834.214393][T12594] kernel_sendmsg+0x44/0x50 [ 1834.218918][T12594] sock_no_sendpage+0x116/0x150 [ 1834.223771][T12594] ? sock_kfree_s+0x70/0x70 [ 1834.228399][T12594] ? mark_held_locks+0xa4/0xf0 [ 1834.233158][T12594] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1834.238619][T12594] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1834.244104][T12594] inet_sendpage+0x44a/0x630 [ 1834.248737][T12594] kernel_sendpage+0x95/0xf0 [ 1834.253324][T12594] ? inet_sendmsg+0x5e0/0x5e0 [ 1834.257999][T12594] sock_sendpage+0x8b/0xc0 [ 1834.262422][T12594] pipe_to_sendpage+0x299/0x370 [ 1834.267316][T12594] ? kernel_sendpage+0xf0/0xf0 [ 1834.272093][T12594] ? direct_splice_actor+0x1a0/0x1a0 [ 1834.277383][T12594] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1834.283638][T12594] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 1834.289906][T12594] __splice_from_pipe+0x395/0x7d0 [ 1834.294922][T12594] ? direct_splice_actor+0x1a0/0x1a0 [ 1834.300202][T12594] ? direct_splice_actor+0x1a0/0x1a0 [ 1834.305475][T12594] splice_from_pipe+0x108/0x170 [ 1834.310322][T12594] ? splice_shrink_spd+0xd0/0xd0 [ 1834.315259][T12594] ? apparmor_file_permission+0x25/0x30 [ 1834.320817][T12594] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1834.327076][T12594] ? security_file_permission+0x94/0x380 [ 1834.332707][T12594] generic_splice_sendpage+0x3c/0x50 [ 1834.338082][T12594] ? splice_from_pipe+0x170/0x170 [ 1834.343101][T12594] do_splice+0x70a/0x13c0 [ 1834.347440][T12594] ? opipe_prep.part.0+0x2d0/0x2d0 [ 1834.352731][T12594] ? __fget_light+0x1a9/0x230 [ 1834.357412][T12594] __x64_sys_splice+0x2c6/0x330 [ 1834.362281][T12594] do_syscall_64+0x103/0x610 [ 1834.366874][T12594] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1834.372753][T12594] RIP: 0033:0x458209 [ 1834.376659][T12594] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:53:38 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b0") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1834.396258][T12594] RSP: 002b:00007efd8c210c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 1834.404667][T12594] RAX: ffffffffffffffda RBX: 00007efd8c210c90 RCX: 0000000000458209 [ 1834.412624][T12594] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 1834.420605][T12594] RBP: 000000000073bfa0 R08: 0000000000810003 R09: 000000000000000b [ 1834.428564][T12594] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efd8c2116d4 [ 1834.436517][T12594] R13: 00000000004c6fdc R14: 00000000004dbc20 R15: 0000000000000007 03:53:38 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xedc000000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:38 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) fremovexattr(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="50747266732e706f7369785f6163815f61636365737300289f0648b2f981f848bc1fae3dce914f1d713cf7d51f1d121604c1a93ba94c2460a9176f437950fe8e4422b965745a9a0fbcc8b309970051ce43da2955e8e7ae764c"]) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x4) 03:53:38 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x1000000000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:38 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0xa0008000) [ 1834.645184][ T2489] block nbd4: Attempted send on invalid socket [ 1834.651526][ T2489] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1834.662749][ T2489] block nbd4: Attempted send on invalid socket [ 1834.669034][ T2489] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:53:38 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:38 executing program 0 (fault-call:8 fault-nth:8): pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:38 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) setsockopt$CAIFSO_REQ_PARAM(0xffffffffffffffff, 0x116, 0x80, &(0x7f00000000c0)="9386e4d5b953c435dc30589772e2163a3ac889767acea68b2730b7ed2fd248b6b21a3a3ef4ebd037c0907b2f066d009b1737a3ef598926e48f7037d51b9604b161225dcd4604f18184816d013867d9be8d16901424107685630bd84dd59bfc76938be8b1303097f7c9e5f43329a20bb9e20f697b9a4adf2abd48deb1d8f2de253a26d43b047c85d51ac7bd", 0x8b) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x20000, 0x0) r2 = getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@empty}}, &(0x7f00000004c0)=0xe8) r4 = fcntl$getown(r0, 0x9) r5 = getpgid(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000002b80)=0x0) r7 = getuid() lstat(&(0x7f0000002bc0)='./file0\x00', &(0x7f0000002c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) waitid(0x2, r4, &(0x7f0000002c80), 0x80000008, &(0x7f0000002dc0)) sendmsg$netlink(r1, &(0x7f0000002d00)={&(0x7f0000000040)=@proc={0x10, 0x0, 0x25dfdbfc, 0x2008000}, 0xc, &(0x7f0000002b40)=[{&(0x7f0000000180)={0x220, 0x2d, 0x700, 0x70bd27, 0x25dfdbfb, "", [@generic="2e10534ad39fb2dd0ac643e7141c571a19051d91d42de31e3a3ef3", @typed={0xd0, 0x6b, @binary="b2b50ebee58aaf354d57582574fd46f3999045475ac776e1931bd2781d57a67c657d178fbe9fec9614e0635c50983fd7a36d70f5dfe7070a0a0ed31f01ec2abd7ca7a540cbdea57bf5b5b8b7db4ac916f5c5923d4bb307960a3033fd8d30d54ca7d3ad09d89f78b608296fd91f80244e9af6e1e5ee7c0aec024b2aad2a5bf9778987df2390b2acecf9408c0b916ce96cf73a77cf318a5c47a6da54e5632a2060db686114f17a0a212a6fdb2590bdd5ef4011b0638fc716b16ef47b84ae051ec3d2b1ecd1f5e63360b18c"}, @generic="31f55a4ff99be8c830e4712e25bb25c04d4e40f8581a50ddf63085cb072d2d", @nested={0x6c, 0x52, [@generic="96a718a74a404b3aa23db949fbbb93992be2445a4850051f9b9cbd3532e9c188f984b8606d06e7bcbb82f3bd77a8e14beaddcb61774d53bb88c61a64e38e897f736f82c2b3a5ae489b395995a214a36bfde2c540c219f915", @typed={0x10, 0x7b, @str='!{self#&\x00'}]}, @typed={0x8, 0x36, @pid=r2}, @generic="e1b21daf0c851b08b82a4942929d66e31006081f23e3c114d691bcf28f47393e3e6950b60bc949de422ea3f140b175ff78d89a5486e36f000ad79c2349bea07141485a59ac0be49896863e9115873f6dfbcbfbb32e12128a7f9c715a57ca95547520bde3f8a1e00c15695fe32b3b6e981981c67e82271485b5d985bda40c258fae2142cd795721af3d9bbb3ed1589e"]}, 0x220}, {&(0x7f0000000500)={0x15d0, 0x1e, 0x8, 0x70bd29, 0x25dfdbff, "", [@nested={0x234, 0x27, [@generic="1eac4aed0599938c5d4bf8abe0998c74a05487d39166d5784c7632a8855f89e73b1b8ccbae23224a3bed6d0e72bbb2b26b06626b3e31f6731ee90a777a00f42fa2de445ddcdab15ff38297e41007944c50d0a93eccfe84c09924b91794ee27ba1773ff0e440c23dce4ae9b18997accb2dc8609850ccc7c891c584c15fa7ddccf5e793de88422095177130a8f0cdfda2a57c072e4b482562fc46445ae560e45c0e138089e0e1f918c7ea79f27539f9510095bc74f040d23a7aa192a9e7c35f179947f4407a4cfad0afcd1a0ad97f0aa45975aade51dd5f33ee8597fe84b9c33eba1d902a40a8a15c252cdf8f2db", @generic="627482e875d094045e80d0db3bb7db306336321fe98a0c57fd17d038971e935d0232a15936049bfffcb8a3504188b134bee09fc276cf1f1f730809cbd467a4e42f8b20ac674be1587d25aef608f773131f71ee1f26c0", @generic="c7cb556158cb56a7f03200e6a2f51543810c1658808a57fff67ef2d906571a62adc8251576b4677c306c1472a9bc6115a6c8fea5d6e88b21ad34f5342523efb200b77a910cc8159657d8000a25759f524744aec708976afcf2200073953474dfd1ea60b70f388f0274d56e821f2599aca28b613c2930520398a2008d4376745db6e3747dbe63946ad531b9071da7475e83b50fada1c74769e0184d565f1e4d9794646380e222727cb66141120656107581e00b7c5a5f37b0b93e183ceaf152e75622b0e851203a148f72a0b8020cd3d67f3fe5bd4df7191ba63ec6e9e525ddcd750fc4ff7f246c729039"]}, @generic="3bb9b7b3560e450a99220dc8075659a3797cb72b3aaaab790d5b0646035edba1c70bff5757bbbb7a46e903f2dd37997a2f53613b2dedafe5f52aab87c91058af7ea4", @typed={0x8, 0x64, @fd=r0}, @nested={0x1340, 0x4c, [@typed={0x8, 0x4d, @uid=r3}, @generic="5c54e73aa631ecfef856cd9899e97e4fdfc94f0202831a7aa5fc0a4847ba24db08dc0dd80c1eaecd09cc92ccaacbddf25a8dc20da8bdb5db106e1e5a6912c2ee87cc1e07dbc4cdd0ac8fe2b2dc43bb71c6a204aa85557060a393d5b714a933aa126a68927708432560929c6c12f49ee5d9cab5b959961670650d09a5762cd6d568928e73c88b5c9bdc230e364c5e5b61336bc546743544c91b048e87b0a531d00a60fb978fb07c27eea8d7fc8707756286a9709238", @generic="e8f8c522d08fefd94fd7481ca44c143c35792c0b048c6f756119b30b4a493fdf78cef1ac9a602ab528838d7ba3b5646719ec711dfd79be322d6ba7c580a33f334ce08309a311d98a46dde45a25da9b57d1d1c8eb2eff85d540b354ddb9980bf35513b87b61befef5034746806f16f5c3370711b1104560fbc394fdba0c0252d3f0f87f9384245deaba6f2319e5a9c7db51afc1669e17d9ca85f2c81128db376204216eb49d3dfacaaa55a57980f4d78f863d3f774276e55ddb646d01357895869bd5f0524f87725c496d358aeb129d3417ad6c8c5a86da789caffc6e8c16e1bbb92abba29bafde3d83", @generic="a7b6474b202c791067bb228c2f4211b5d6a7ed6718408f2d1f38efc783c0beff05d91eeff6bccf4562b64d3cd168f2ef5b6a35fa621246a21bc98cee99ce8c4445894f821b3286a503a8a5344e4b905583f90e07e096a49c57a824373f8971eec8df7fe0fb57e0db615fcc54d130e0d7385d741587243304181baf", @generic="5edba7c9f1ba71faa34dd2ae439d53f3ca4e7c8a4f89b7305694664bffb883172682d37f2a7e6c33d13b0bb69fe4272462fece9a858360bad1aa93f3cd351f6d2c6e4215d930b8d1b9079d1b8cd994fa57a8fc9a6f7d8b908587326751ee39e83d7a1fe3459f532ea29a1e2d79ccea0b7bdd47a0eeaea33607d59f1c746244bbb7d83259e68e4a9cdd98e55621a4e088516dd01717ebdef5e38eb99b6634f698d488bd19cd4df9b5aca222bd1ec892387a17961c4984fd00614571398bb5cf5fdcba7bb706121d70499200762ac0595f15017a89536b86aab9364a3479b09549e32006ff20fcafb8922ba3cd0babe1af1baa55b5c868d9c07ab06b51391c2b1a4c85234c9aa98fb4303890879111847e75a924e7a8698963a63eaefc646b20e06f6d04e0f26876284d540d247e2c242bdca72613b3765ff03c754ce541e6c10b7f88d96af2565429a500aa18c90de9734be6074d082f43714d1ac59b119020da7bc6bef15ea7849d4196cd9262158237a3497d72b73698d2c126bf7b18333b0d2561870e7b3f5e649da6ed78e7fa540cccdfb36abceaafb8507ad5df20ccf98601d161a7a79d291e6d26049ff84299649a0901539f6823ea07fc29941a6836c7c2652a34506131698dbccb4cb12865ccce69d05d73c03cd913e442deb3ae6641dabcb8c1d4739700ba21f26dc1a9f2a6ffb9c7f466393c3fe5b16492958e6c9faf218474a5bf24a805dd67b98e0a841e09a8ef5946fcbcd6574c011c752be011c3ba337469c49b1008a9e65431b2b7b036f26712e8d3fe1ac5a5fc325cbdb6961aa586a5f3afcd3fcc9ed519391216a2e2b7e64d807a7b882dbe1b5a829378474ef2aff8087a2ae6bf1fc908396483ea29f7510d7b15d7db31a8e2cc4be52ca9b977c9a7f12469690dcddd5f5f3f589e0cf4fc0c91dcfa2f0e309abbae0668817b0ff58d9b74bc69bfed9662b9b5c7512efd6cd124332eaea59f8d568d312ad6deb9ed47f3f396c585262aa2600473b1a50a0618e2f398393e2cd940aff5e41da401c3b6ecbd5c1971f83b64839437b7afaad4d0adb3697b8f74bc59a1b741c72fbcd3944260eee9e1076f835b27c6e7b7463dcdf8a2bf86ee7716f26f5d6a61d8845ff66b646d066957c22cdccf8af5123d4486e0f06e554753de6004c6fc9ad03df1880e978b9146687307dd3d6cd1406f5a4f0ecd6f48f038ef0e35652c6327060381f70f2facc0be45ad6b0712eef173d9586292ded0256d1c2e745945f3582dd84376f13e252f3fcd60f96f110951e08a7d1d5015a6df5ab21e45214ad727e55eee62e605a030b94864c99779b367835dfdbddee609848589a7f3d98f4217edefca78a9d06f457331f06c1069ce205c2ca57d8bc557eb44a143d69b1299122c188258405735e02ca4c03b0302b0fc576c7fa19b76ad9347d85b307c1a398910527c6ed6d1d6a29413b49b3b1cdcd1301073fd654bf6e60b9b8aeb91ee894de27a8d2f290b4c43b9c4c71bd42939caa9e1d3b6a83d80eaab3676db431164b2cbff19fa78f1287639c0a009f66cfb54983258c14bd77043abfb08964add1cf3c4e3ff0f3375752557f17d19ba83360c165f4a7eb3e686f8c2dbbbd84c18d5a824e8431cfda2e67a0bc14de02b0a7ce5c03fc016740c03ca2c71291daf052baed7857e2ceb8fe245b473ec315cc32d8e0d33de69de6e335e4b13cbf841dfc8a6167b6578e7c5a5294e8ec20c77c4b93968fa6adf4f84021827407cd698ba2345ea031dc9e7f4d324c8a401822e391e8d0e38aa5e537066657be753c6a3857ec0f1e507f45d05369b29a99111f7cd4837f5e276af9c85777530eaa1e5c611fb95be770466932ad01d11aefb8e5f43939353fb5c80c7634a781cfa73bdfff1cd3a8d60ce9012c2ae78260fb90a12fac00f879baccc64f3809d329362574bbe9cb8282d74b9b034b978b22e572f5c3194623092dca2ceb963ed3b4a60db841b5bbb6b0dcbafebb94fddbaeeb78a62412b12edabc8348a52e93a596cc614ddc6dab9d7484e58a106526b3e334f668a81469b0827944b9c34801a35c2a9515ec0ea33928f2aee988a2ef2a3f97fd20a2fd03b806fddf756b8ea13457c021c516a1ce611ac715c1e75b341e58839ece7a10b03d067206edf8ed32dd7e7e922cd066004ecfd9b9164f3a01faedfb1ea4057ed011defa3e5da678abb24d19d6ba039e53526bf5a20800ccaeaa72057b14f943257c263f58f2ceb1615be548497a1f855c0acd6539dd8fc43761ddd3577c0b0ee25a70d016906c056f651814036244b83d1610309839d3a9615b0e62e9d74278fccc99b2ada04a71bc4133d19e81ee67f77dcbdc205ae1bfd1db203663405bde6059d3ec373ec6ba4fb1431c9fa9bc7f3f61106a54025b3c823fbf975bc81d91b73ec2f0a992f1249fd6746ca9943a7740a7e0836c7c01259d70bb2dc63d495cc0192dd0dddd41e82f1cd5fd1cbebdfd8f524c38bdb993d33f6d5925d2e26cd4fdc26d2c3e568213fdfb30ea6e9f11350e3884e930cfdc1d388a0c31946e5fa956e37cb6679ff9852ec3379d7f2ca09fd037d82678aaa8090d949e7dd142f5a734e30909faaa48324f22a24f6ef6b72da1c5adf2ddc84ff10dfb9c0d6b3d0bf8664f95635a60d3e62be5e70a4d9fd3e70e00bae015f6f3c5b7fa0e39337046c8279b3d8b3a50815b0c6ff51ccf4af6fbd4d44cd02be04d5c42c720fcb782bb279d272393e8969f8941a1726c06526d3f874656bcfd6359be4ca0ace3bdcf55bd67a92bed20a34a650fbb65e51c07a1d9143a160e8bbcee98afc2cbe7626cbd809a49d5aaa058124ff95226b8e607f3050380e5d8cf99623fc3ddf84e9340d16f1c6a0ecf8152e83788c629ba73bf501872625752a64ecbb8d7d130274306b37ae580a1d992f407edb084b49157807d02e28fe61b9ff042e8af6e5b24ce1229a447d735b7abe439594d5564c032f7f4c4185fba1ecbd1f58c4097a6410de917675aa837b4e0c6a582ce7c7a3e3a4b931c4726295e7999aae5e109e0f5be530ea3f8dcfae94dcc6faf880513d4e3471eaa2a9390df833b2d2ff58e657031b89e2c67fb13a5d2eaa1aea8380f7a66c71817325a9c5d61686ac6fb2f74d9d811614f99f8166d5d6968b92364c4b046028792c377e9b417044cabb00e1e4fcc5e80ae95bdfcc3aed62e9ae9e3945a7950d4a4fe6625f6058207e42b29988a0941e6635ed77d1d179643b1f106fa97f85fc000d03cc462d1dc9f7a67386d8582814107473562f0e5a7735b9f4c4dd9cb8d7df422d6141e45a419956e7bb27ade90dd3d1c1050b3f8e1d861f5755b77e38c1fb906941fe3614fb768b6968b37a2afccf296857be8755de5f387818204e02f1e159fef917874cce3ee0cdabe0eac89f4fa0fb3dc90ee732ec9a918a750225ee2deebd1037393e5c57d341672f527e8ee438d23ad8b89db7d6c52a7cdd466e8d64fe215fdf17e12dbafaa44357aa762cf7e66c7cde6ce455e86bce239c269abf87f5054d82c54413f10b3219df8209cdabf2e00f31414986f590bb52add9ab34a5572e28e28a3fc2271520ad05bed247861dc11fa0e9ca51b5985ad85aeec76717da9a5847a70615490529deaa8675e1d27b9fc19f5061c419f25cd2d799d345a65416d43feadd430132e5b23b046790e184e0880b46657f412f785349882d195d0ce01e9204d6b21ac4ffdc3fec8b4fb3c13155391465977303ee050fef6f2b84f54fdd812373106cdc4c7a8d51b93a9f3a641b9247c7caa9462b17c059f199cd779e5df7c81216bde28044d75725c033ab61188af67dd4f12d298e6b5ed1cbcf6933732796d7f57ce03f8e8cbbd8e5020f829cadec823a5aa2c14727fb64a8f06a480164780792b3f909de7e815784ff14c5b4e15e8c3f0b715d6f6813f3f36f542bed0865f41c854d771255c8638dfb2409688611345aacaa961853712f54baacc687f6b76f76c06790a776db04dc61b65c002d1d3d92a77f5274e30baeee0e0af93b0310952b7f1ad440ce9d81dd2f0134e20f2c4dc6f19f6b2a5ad011b2e0c7e73fe86467e4c1f4c801f3dea7934f4b83b1f00c6911d12a33a95cc4e88c5cb68d778257dd5d3de789c65d380380a0f74c7eebdb9aa8c960a129174529997dcd9ba5ffed896120900153c4a967c46a8e7da99c85e69936153737c30f1821519cec5f4e9ef1f35f5a95dd08955aa0f537c0f2fb7c75362ef4f860dd8fadba3f00089a24f9bac01a274da231f09ab348eca811104baaf32d44847fe1a46f8472bc25fcee20bbe3124dd98cc2e7a1d72b418e04a6a51ccbe1b0c95459c456c78c1d84e87f673fef5451eeedc3ca9e273a2728a4f4da0c58e18e8a2cce119b8bd16604dec672302f9ed99931f7ecd859e1ee1a2b7d4c968bbc3b6c811a7ad226355d2a176c4eef74dc124d70e92d1898cfa2e78828b3b61c7d1ccc22efbb46be6ee9a4ca59f621b317fb09de2fd1a5bb08fc782dc8e31bf64f99b9615f317daad5b6cc8b69c81f9cdaae13dc2e7ed50b1e5d55a7ec656ccb9198e34bdcf2c3c5d14aad0fae7338005e35f177244f5fcce282f12673b43565f64e60a5cc78c1df96441442156e8ce1137a6e86b296c94cf5a31b9be1ebc36306463e0dfb2389682be64a9fd9236168d6ad885cd60665a230d3d4b0f36bf5ac103bdb44ea93b371415fb5b69b7d9b98ab213f561032a958d60fb931d401a19991169815e928728f9283298c1dfb6dbf52eb6d09ae25959aa0961ae63d52b13ca0fb490245ebdf48ad0cdc229071691cd8334dc24a7d08ce4b3fc6b028a1a99b1f732ba0e21981d3449629de3f982976840dc442fef397a774caead2e89789c9326970ece9ddc0b3c502387c3d5e0f9b1023da88fee00eadab0a98dbb7b78f103c46d96dad4031b5d3059c3e0c54492ebf599ad7298385131055fc9d1b1884092b91df4e3b0cdbbb8370fa747d5011734d8014beded0f861d6e2c3001db0175642b4a486cbdc2f461991491b896a4de4f4089a03b762e8f4f6a890e725c0bd977d0ee54b6cef27b73e1d33234fe55f5407a618e4d94434a8a90151b03210b4c98ca4811ce5bdece859dfa9dd2b8ec1bcc1dfb8ca0683dcbb7b3a9439d8c8ef9a04d76a4eae1daa0857c6930807f935c48979870be9e7c30b893c1182c8ad3c4acca288a786a14494ebcf2745186791feed0e60ee6b8140bcfa6d3b1eb94cf00b050e3a9354997f680e79a9b14418c627a2cc9a67d8c237a1a2e02db5c9d4e9cbd67da5f402d007440bd621052aa62c6c2389b7c29ac5d80157bb8ec5f1c270c74b8b7c89927042f3fcb41f56943dcb9b0434700e20e1c7e4b8fc9dc2589947610c07e174ef5c7ace18a26d2dc93d4cf2045591d205a0e74ea36f393581f635de7dd75476f57b28b93fa4b83f5a5dc01bcd6e85099bcbbb0a393043a7d7854b56a3674ce55c9b24caedbe43671fbff2c743fb2a34b2af0ae28c757b8ac9eff2c803ffedb4ed8fec07a1c6d96e5d3a30c6478c33415413c0dadc2c768674fca646ff65be719f9c58046a3ff2ac006345e86b0bf998d92ffa1ba4a401fc47b900221485244a16de10d23f23f9581a260b43f67218e8b8e93420fe295fe703f6556722eccedf53b80ae5ae7e02bd2732f0c2ff243ff0710b9e5283d18749a7d3424bdf4e2a99db1c981d978199cd5d1a39f5d50fce7a7d2917b7bee78608ed1e06fd04742059ece0958de6f078db2067355884e68fe054fe0926d8b17e25e4594e8938dec33e123656ba5340", @typed={0x8, 0x28, @u32=0x9}, @generic="3b42d457de66ebadacbdc1167786", @typed={0x8, 0x46, @pid=r4}, @typed={0x8, 0x32, @u32=0x100000001}, @generic="17d3e6d19d03a417d583e2af32adff2e1ad2add42cd89f307ccafef8104fc66bd350aeec184998b6d3450105bcf025bdb42cd28ded27df56c61853fb4d822d8b0976c201cc502acef2998c0cd45dd22009c00f1a61c1c60663f28be6913166e039badee1a9f7b7c616c39421c001cb6b637dbc6487cbc691b6a08922ab179fb038d12f5a403c951a1cd9938ad2a052194e263f030fa22214fc9225306798cb21b445a9ca9fdcf91b2382376d13a641b00a330bd52ada92b15c4314fdf9b6a8cc10c57112f0a15e03eb37ae75e1059e08fa927080b5a042ee3c6f8bed2e92d611227a6b1f1dbbdda2dd5b3f3b18f6fd5b3f4a04a0b8"]}]}, 0x15d0}, {&(0x7f0000001b00)={0x1020, 0x8001, 0x1, 0x70bd29, 0x25dfdbfb, "", [@typed={0x8, 0x1b, @pid=r5}, @generic="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", @typed={0x8, 0x7a, @ipv4=@empty}]}, 0x1020}], 0x3, &(0x7f0000002d40)=ANY=[@ANYBLOB="20000000000000000100000002000000", @ANYRES32=r6, @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="000000002800000000000000000000b7ce85690100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0], 0x48, 0x4000000}, 0x800) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) lremovexattr(&(0x7f0000002e80)='./file0\x00', &(0x7f0000002ec0)=@random={'os2.', '!{self#&\x00'}) [ 1834.765780][ T2489] block nbd4: Attempted send on invalid socket [ 1834.772212][ T2489] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1834.777809][ C1] net_ratelimit: 16 callbacks suppressed [ 1834.777817][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1834.785008][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1834.791471][ T2489] block nbd4: Attempted send on invalid socket [ 1834.803030][ T2489] print_req_error: I/O error, dev nbd4, sector 120 flags 0 [ 1834.857778][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1834.863580][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1834.869437][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1834.875221][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1834.881076][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1834.886846][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1834.892712][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1834.898515][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:53:38 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x7ffffffffffff}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:38 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x1, 0x8000, 0x0, 0x6}) [ 1834.943313][T12641] FAULT_INJECTION: forcing a failure. [ 1834.943313][T12641] name failslab, interval 1, probability 0, space 0, times 0 [ 1835.002040][T12641] CPU: 0 PID: 12641 Comm: syz-executor.0 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1835.011189][T12641] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1835.021248][T12641] Call Trace: [ 1835.024560][T12641] dump_stack+0x172/0x1f0 [ 1835.028915][T12641] should_fail.cold+0xa/0x15 [ 1835.033572][T12641] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1835.039417][T12641] __should_failslab+0x121/0x190 [ 1835.044380][T12641] should_failslab+0x9/0x14 [ 1835.048896][T12641] __kmalloc_track_caller+0x6d/0x740 [ 1835.054197][T12641] ? lock_downgrade+0x880/0x880 [ 1835.059058][T12641] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1835.065313][T12641] ? nf_ct_ext_add+0x2a9/0x640 [ 1835.070100][T12641] __krealloc+0x71/0xc0 [ 1835.074265][T12641] nf_ct_ext_add+0x2a9/0x640 [ 1835.078874][T12641] init_conntrack.isra.0+0x439/0x1170 [ 1835.084265][T12641] ? nf_conntrack_alloc+0x50/0x50 [ 1835.089309][T12641] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1835.095562][T12641] ? ipt_do_table+0xf1e/0x1b90 [ 1835.100435][T12641] nf_conntrack_in+0xd93/0x1410 [ 1835.105303][T12641] ? nf_conntrack_update+0x960/0x960 [ 1835.110598][T12641] ? __do_replace+0x910/0x910 [ 1835.115431][T12641] ipv4_conntrack_local+0x169/0x210 [ 1835.121007][T12641] nf_hook_slow+0xbf/0x1f0 [ 1835.125445][T12641] __ip_local_out+0x403/0x880 [ 1835.130163][T12641] ? ip_finish_output+0xd50/0xd50 [ 1835.135201][T12641] ? __ip_make_skb+0xf15/0x1820 [ 1835.140069][T12641] ? ip_append_data.part.0+0x170/0x170 [ 1835.145539][T12641] ? dst_release+0x62/0xb0 03:53:38 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0xf6ffffff) 03:53:38 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x7, 0x200000) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000140)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000180)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000200)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000240)={r2, 0x0, 0xa}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffff9c, 0xc010640b, &(0x7f00000000c0)={0x0, 0x0, 0x7}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000100)={r3, r4}) [ 1835.149969][T12641] ? __ip_make_skb+0xf93/0x1820 [ 1835.154859][T12641] ip_local_out+0x2d/0x1b0 [ 1835.159305][T12641] ip_send_skb+0x42/0xf0 [ 1835.163566][T12641] ip_push_pending_frames+0x64/0x80 [ 1835.168783][T12641] raw_sendmsg+0x1e6d/0x2f20 [ 1835.173393][T12641] ? compat_raw_getsockopt+0x100/0x100 [ 1835.178910][T12641] ? process_measurement+0xd5d/0x1570 [ 1835.184294][T12641] ? process_measurement+0xd5d/0x1570 [ 1835.190158][T12641] ? ___might_sleep+0x163/0x280 [ 1835.195010][T12641] ? __might_sleep+0x95/0x190 [ 1835.199687][T12641] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1835.205331][T12641] ? aa_sk_perm+0x288/0x880 [ 1835.209858][T12641] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1835.215416][T12641] inet_sendmsg+0x147/0x5e0 [ 1835.219935][T12641] ? compat_raw_getsockopt+0x100/0x100 [ 1835.225406][T12641] ? inet_sendmsg+0x147/0x5e0 [ 1835.230100][T12641] ? ipip_gro_receive+0x100/0x100 [ 1835.230181][T12641] sock_sendmsg+0xdd/0x130 [ 1835.230197][T12641] kernel_sendmsg+0x44/0x50 [ 1835.230215][T12641] sock_no_sendpage+0x116/0x150 [ 1835.230230][T12641] ? sock_kfree_s+0x70/0x70 [ 1835.230265][T12641] inet_sendpage+0x44a/0x630 [ 1835.230283][T12641] kernel_sendpage+0x95/0xf0 [ 1835.230296][T12641] ? inet_sendmsg+0x5e0/0x5e0 [ 1835.230312][T12641] sock_sendpage+0x8b/0xc0 [ 1835.230325][T12641] ? pipe_lock+0x6e/0x80 [ 1835.230342][T12641] pipe_to_sendpage+0x299/0x370 [ 1835.230355][T12641] ? kernel_sendpage+0xf0/0xf0 [ 1835.230370][T12641] ? direct_splice_actor+0x1a0/0x1a0 [ 1835.230385][T12641] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1835.230398][T12641] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 1835.230416][T12641] __splice_from_pipe+0x395/0x7d0 [ 1835.230431][T12641] ? direct_splice_actor+0x1a0/0x1a0 [ 1835.230451][T12641] ? direct_splice_actor+0x1a0/0x1a0 [ 1835.230465][T12641] splice_from_pipe+0x108/0x170 [ 1835.230483][T12641] ? splice_shrink_spd+0xd0/0xd0 [ 1835.230504][T12641] ? apparmor_file_permission+0x25/0x30 [ 1835.230518][T12641] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1835.230542][T12641] ? security_file_permission+0x94/0x380 [ 1835.244482][T12641] generic_splice_sendpage+0x3c/0x50 [ 1835.244498][T12641] ? splice_from_pipe+0x170/0x170 [ 1835.244513][T12641] do_splice+0x70a/0x13c0 [ 1835.244537][T12641] ? opipe_prep.part.0+0x2d0/0x2d0 [ 1835.342007][T12641] ? __fget_light+0x1a9/0x230 [ 1835.342030][T12641] __x64_sys_splice+0x2c6/0x330 [ 1835.342055][T12641] do_syscall_64+0x103/0x610 [ 1835.358101][T12641] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1835.358114][T12641] RIP: 0033:0x458209 [ 1835.358129][T12641] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1835.358136][T12641] RSP: 002b:00007efd8c210c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 1835.358150][T12641] RAX: ffffffffffffffda RBX: 00007efd8c210c90 RCX: 0000000000458209 [ 1835.358158][T12641] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 1835.358166][T12641] RBP: 000000000073bfa0 R08: 0000000000810003 R09: 000000000000000b [ 1835.358174][T12641] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efd8c2116d4 [ 1835.358182][T12641] R13: 00000000004c6fdc R14: 00000000004dbc20 R15: 0000000000000007 03:53:41 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b0") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:41 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x10000000000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:41 executing program 3: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ashmem\x00', 0x80, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0xfffffffe) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x400, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000040)=""/42) 03:53:41 executing program 0 (fault-call:8 fault-nth:9): pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:41 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0xffffff8c) 03:53:41 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) [ 1837.550062][ T2490] block nbd4: Attempted send on invalid socket [ 1837.556286][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1837.564503][ T2490] block nbd4: Attempted send on invalid socket [ 1837.570861][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:53:41 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ashmem\x00', 0x2, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) 03:53:41 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x8000a0ffffffff}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1837.595154][T12682] FAULT_INJECTION: forcing a failure. [ 1837.595154][T12682] name failslab, interval 1, probability 0, space 0, times 0 [ 1837.634204][T12682] CPU: 0 PID: 12682 Comm: syz-executor.0 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1837.643447][T12682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1837.653520][T12682] Call Trace: [ 1837.656839][T12682] dump_stack+0x172/0x1f0 [ 1837.661196][T12682] should_fail.cold+0xa/0x15 [ 1837.661217][T12682] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1837.661239][T12682] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1837.661266][T12682] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1837.671155][T12682] __should_failslab+0x121/0x190 [ 1837.671173][T12682] should_failslab+0x9/0x14 [ 1837.671187][T12682] kmem_cache_alloc+0x47/0x6f0 [ 1837.671204][T12682] ? skb_clone+0x141/0x3b0 [ 1837.671220][T12682] skb_clone+0x150/0x3b0 [ 1837.671239][T12682] ip_mc_output+0x3aa/0xf70 [ 1837.671254][T12682] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1837.671273][T12682] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 1837.671297][T12682] ? retint_kernel+0x2d/0x2d [ 1837.709946][T12682] ? __ip_local_out+0x44f/0x880 [ 1837.709967][T12682] ip_local_out+0xc4/0x1b0 [ 1837.709988][T12682] ip_send_skb+0x42/0xf0 [ 1837.710003][T12682] ip_push_pending_frames+0x64/0x80 [ 1837.710020][T12682] raw_sendmsg+0x1e6d/0x2f20 [ 1837.710046][T12682] ? compat_raw_getsockopt+0x100/0x100 [ 1837.710062][T12682] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1837.710085][T12682] ? process_measurement+0xd5d/0x1570 [ 1837.720679][T12682] ? mark_held_locks+0xa4/0xf0 [ 1837.720712][T12682] ? ___might_sleep+0x163/0x280 [ 1837.720730][T12682] ? __might_sleep+0x95/0x190 [ 1837.720749][T12682] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1837.720761][T12682] ? aa_sk_perm+0x288/0x880 [ 1837.720783][T12682] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1837.720803][T12682] inet_sendmsg+0x147/0x5e0 03:53:41 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xf0ffffffffffff}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:41 executing program 3: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socket$kcm(0x29, 0x0, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000000)=0x2) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pause() splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) getpeername$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) recvfrom$packet(r0, &(0x7f0000000140)=""/127, 0x7f, 0x0, &(0x7f0000000200)={0x11, 0x11, r3, 0x1, 0x1, 0x6, @broadcast}, 0x14) [ 1837.720818][T12682] ? compat_raw_getsockopt+0x100/0x100 [ 1837.720830][T12682] ? inet_sendmsg+0x147/0x5e0 [ 1837.720852][T12682] ? ipip_gro_receive+0x100/0x100 [ 1837.815082][T12682] sock_sendmsg+0xdd/0x130 [ 1837.819512][T12682] kernel_sendmsg+0x44/0x50 [ 1837.824026][T12682] sock_no_sendpage+0x116/0x150 [ 1837.828889][T12682] ? sock_kfree_s+0x70/0x70 [ 1837.833425][T12682] ? inet_sendpage+0x58/0x630 [ 1837.838122][T12682] inet_sendpage+0x44a/0x630 [ 1837.842728][T12682] kernel_sendpage+0x95/0xf0 [ 1837.847336][T12682] ? inet_sendmsg+0x5e0/0x5e0 [ 1837.852044][T12682] sock_sendpage+0x8b/0xc0 [ 1837.856482][T12682] pipe_to_sendpage+0x299/0x370 [ 1837.861346][T12682] ? kernel_sendpage+0xf0/0xf0 [ 1837.866131][T12682] ? direct_splice_actor+0x1a0/0x1a0 [ 1837.871439][T12682] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1837.877694][T12682] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 1837.883778][T12682] __splice_from_pipe+0x395/0x7d0 [ 1837.888818][T12682] ? direct_splice_actor+0x1a0/0x1a0 [ 1837.894119][T12682] ? direct_splice_actor+0x1a0/0x1a0 03:53:41 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0xfffffff6) 03:53:41 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xfeffff00000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1837.899414][T12682] splice_from_pipe+0x108/0x170 [ 1837.904283][T12682] ? splice_shrink_spd+0xd0/0xd0 [ 1837.909240][T12682] ? retint_kernel+0x2d/0x2d [ 1837.913865][T12682] ? apparmor_file_permission+0x25/0x30 [ 1837.919433][T12682] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1837.925692][T12682] ? security_file_permission+0x94/0x380 [ 1837.931347][T12682] ? rw_verify_area+0xb2/0x360 [ 1837.936135][T12682] generic_splice_sendpage+0x3c/0x50 [ 1837.941427][T12682] ? splice_from_pipe+0x170/0x170 [ 1837.946459][T12682] do_splice+0x70a/0x13c0 [ 1837.950794][T12682] ? opipe_prep.part.0+0x2d0/0x2d0 [ 1837.955992][T12682] ? __fget_light+0x1a9/0x230 [ 1837.960703][T12682] __x64_sys_splice+0x2c6/0x330 [ 1837.965553][T12682] do_syscall_64+0x103/0x610 [ 1837.970232][T12682] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1837.970246][T12682] RIP: 0033:0x458209 [ 1837.970259][T12682] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1837.970267][T12682] RSP: 002b:00007efd8c210c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 1837.980076][T12682] RAX: ffffffffffffffda RBX: 00007efd8c210c90 RCX: 0000000000458209 [ 1837.980085][T12682] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 1837.980093][T12682] RBP: 000000000073bfa0 R08: 0000000000810003 R09: 000000000000000b [ 1837.980100][T12682] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efd8c2116d4 [ 1837.980108][T12682] R13: 00000000004c6fdc R14: 00000000004dbc20 R15: 0000000000000007 [ 1838.087122][ T2490] block nbd4: Attempted send on invalid socket [ 1838.094730][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1838.119691][ T2490] block nbd4: Attempted send on invalid socket [ 1838.126050][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 [ 1840.137861][ C1] net_ratelimit: 24 callbacks suppressed [ 1840.137870][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1840.149367][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:53:44 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b0") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:44 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x100000000000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:44 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x8000a0ffffffff) 03:53:44 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x6, 0xfffffffffffffffe, 0x200}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000000c0)={r4, 0x401}, &(0x7f0000000140)=0x8) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:44 executing program 0 (fault-call:8 fault-nth:10): pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:44 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x2) [ 1840.644967][ T2489] block nbd4: Attempted send on invalid socket [ 1840.652624][ T2489] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1840.664870][ T2489] block nbd4: Attempted send on invalid socket [ 1840.671209][ T2489] print_req_error: I/O error, dev nbd4, sector 120 flags 0 [ 1840.683671][T12732] FAULT_INJECTION: forcing a failure. [ 1840.683671][T12732] name failslab, interval 1, probability 0, space 0, times 0 [ 1840.696849][T12732] CPU: 1 PID: 12732 Comm: syz-executor.0 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1840.705977][T12732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1840.716048][T12732] Call Trace: [ 1840.719375][T12732] dump_stack+0x172/0x1f0 [ 1840.723731][T12732] should_fail.cold+0xa/0x15 [ 1840.728347][T12732] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1840.734196][T12732] ? mark_held_locks+0xf0/0xf0 [ 1840.738982][T12732] __should_failslab+0x121/0x190 [ 1840.743941][T12732] should_failslab+0x9/0x14 [ 1840.748460][T12732] kmem_cache_alloc+0x47/0x6f0 [ 1840.753497][T12732] ? lock_acquire+0x16f/0x3f0 [ 1840.758446][T12732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1840.764733][T12732] skb_clone+0x150/0x3b0 [ 1840.768993][T12732] dev_queue_xmit_nit+0x2f0/0x980 [ 1840.774191][T12732] ? validate_xmit_xfrm+0x42d/0xf30 [ 1840.779420][T12732] dev_hard_start_xmit+0xbb/0x980 [ 1840.784468][T12732] __dev_queue_xmit+0x2a9a/0x36b0 [ 1840.789501][T12732] ? __lock_acquire+0x548/0x3fb0 03:53:44 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x200000000000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1840.794456][T12732] ? __kernel_text_address+0xd/0x40 [ 1840.799694][T12732] ? netdev_core_pick_tx+0x300/0x300 [ 1840.805068][T12732] ? ip_do_fragment+0x1d2b/0x2520 [ 1840.810088][T12732] ? find_held_lock+0x35/0x130 [ 1840.814867][T12732] ? ip_do_fragment+0x1d2b/0x2520 [ 1840.819911][T12732] ? mark_held_locks+0xa4/0xf0 [ 1840.824667][T12732] ? ip_finish_output2+0x12b3/0x1740 [ 1840.829938][T12732] ? ip_do_fragment+0x1d2b/0x2520 [ 1840.834989][T12732] ? ip_finish_output2+0x12b3/0x1740 [ 1840.840305][T12732] dev_queue_xmit+0x18/0x20 [ 1840.844803][T12732] ? dev_queue_xmit+0x18/0x20 [ 1840.849483][T12732] ip_finish_output2+0x102d/0x1740 [ 1840.854600][T12732] ? ip_copy_metadata+0xcb0/0xcb0 [ 1840.859629][T12732] ? dst_output+0x180/0x180 [ 1840.864163][T12732] ip_do_fragment+0x1d2b/0x2520 [ 1840.869032][T12732] ? ip_copy_metadata+0xcb0/0xcb0 [ 1840.874056][T12732] ? ip_do_fragment+0x1d2b/0x2520 [ 1840.879083][T12732] ? ip_copy_metadata+0xcb0/0xcb0 [ 1840.884146][T12732] ip_fragment.constprop.0+0x176/0x240 [ 1840.889592][T12732] ip_finish_output+0x5fd/0xd50 [ 1840.894430][T12732] ip_mc_output+0x292/0xf70 [ 1840.898929][T12732] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 1840.904039][T12732] ? __ip_make_skb+0xf15/0x1820 [ 1840.908905][T12732] ? ip_fragment.constprop.0+0x240/0x240 [ 1840.914552][T12732] ? dst_release+0x62/0xb0 [ 1840.919111][T12732] ? __ip_make_skb+0xf93/0x1820 [ 1840.923965][T12732] ip_local_out+0xc4/0x1b0 [ 1840.928395][T12732] ip_send_skb+0x42/0xf0 [ 1840.932653][T12732] ip_push_pending_frames+0x64/0x80 [ 1840.937941][T12732] raw_sendmsg+0x1e6d/0x2f20 [ 1840.942538][T12732] ? compat_raw_getsockopt+0x100/0x100 [ 1840.948016][T12732] ? process_measurement+0xd5d/0x1570 [ 1840.953405][T12732] ? process_measurement+0xd5d/0x1570 [ 1840.958818][T12732] ? ___might_sleep+0x163/0x280 [ 1840.963672][T12732] ? __might_sleep+0x95/0x190 [ 1840.968373][T12732] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1840.974041][T12732] ? aa_sk_perm+0x288/0x880 [ 1840.978546][T12732] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1840.984081][T12732] inet_sendmsg+0x147/0x5e0 [ 1840.988585][T12732] ? compat_raw_getsockopt+0x100/0x100 [ 1840.994037][T12732] ? inet_sendmsg+0x147/0x5e0 [ 1840.998698][T12732] ? ipip_gro_receive+0x100/0x100 [ 1841.003717][T12732] sock_sendmsg+0xdd/0x130 [ 1841.008155][T12732] kernel_sendmsg+0x44/0x50 [ 1841.012661][T12732] sock_no_sendpage+0x116/0x150 [ 1841.017505][T12732] ? sock_kfree_s+0x70/0x70 [ 1841.022036][T12732] inet_sendpage+0x44a/0x630 [ 1841.026626][T12732] kernel_sendpage+0x95/0xf0 [ 1841.031228][T12732] ? inet_sendmsg+0x5e0/0x5e0 [ 1841.035926][T12732] sock_sendpage+0x8b/0xc0 [ 1841.040366][T12732] ? pipe_lock+0x6e/0x80 [ 1841.044628][T12732] pipe_to_sendpage+0x299/0x370 [ 1841.049491][T12732] ? kernel_sendpage+0xf0/0xf0 [ 1841.054240][T12732] ? direct_splice_actor+0x1a0/0x1a0 [ 1841.059526][T12732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1841.065808][T12732] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 1841.071873][T12732] __splice_from_pipe+0x395/0x7d0 [ 1841.076905][T12732] ? direct_splice_actor+0x1a0/0x1a0 [ 1841.082203][T12732] ? direct_splice_actor+0x1a0/0x1a0 [ 1841.087480][T12732] splice_from_pipe+0x108/0x170 [ 1841.092370][T12732] ? splice_shrink_spd+0xd0/0xd0 [ 1841.097320][T12732] ? apparmor_file_permission+0x25/0x30 [ 1841.097796][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1841.102893][T12732] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1841.102975][T12732] ? security_file_permission+0x94/0x380 [ 1841.103002][T12732] generic_splice_sendpage+0x3c/0x50 [ 1841.108816][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1841.115005][T12732] ? splice_from_pipe+0x170/0x170 [ 1841.120809][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1841.125897][T12732] do_splice+0x70a/0x13c0 [ 1841.131697][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1841.136620][T12732] ? opipe_prep.part.0+0x2d0/0x2d0 [ 1841.142497][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1841.146645][T12732] ? __fget_light+0x1a9/0x230 [ 1841.152456][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1841.157472][T12732] __x64_sys_splice+0x2c6/0x330 [ 1841.163325][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1841.167893][T12732] do_syscall_64+0x103/0x610 [ 1841.167925][T12732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1841.167942][T12732] RIP: 0033:0x458209 [ 1841.173715][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1841.178510][T12732] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1841.178518][T12732] RSP: 002b:00007efd8c210c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 1841.178532][T12732] RAX: ffffffffffffffda RBX: 00007efd8c210c90 RCX: 0000000000458209 [ 1841.178540][T12732] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 1841.178554][T12732] RBP: 000000000073bfa0 R08: 0000000000810003 R09: 000000000000000b [ 1841.256719][T12732] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efd8c2116d4 [ 1841.264694][T12732] R13: 00000000004c6fdc R14: 00000000004dbc20 R15: 0000000000000007 03:53:45 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x2) 03:53:45 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x100000000000000) [ 1841.366100][ T2489] block nbd4: Attempted send on invalid socket [ 1841.372480][ T2489] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1841.382052][ T2490] block nbd4: Attempted send on invalid socket [ 1841.388528][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:53:45 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x300000000000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:45 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='$bdev\x00', 0xfffffffffffffff9) r4 = add_key(&(0x7f00000001c0)='cifs.spnego\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="d317a5733adc3e9bb18bd57a", 0xc, 0xfffffffffffffffe) keyctl$search(0xa, r3, &(0x7f0000000140)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, r4) r5 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000280)={0x0, @dev, @loopback}, &(0x7f00000002c0)=0xc) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000380)={0x0, 0x8c, "83b7c68696cece4161432f87189ac7f696ea799408864659be8445a7f06435366d10a051c6bf674f059dc8c1203a83cb8e59fd3bc62c6a91400a13626373c1ddd39815de529474f70cee17dc28d0f3536f7b15df232df61978b50514dfd2bb5bb03feeb836efcb53b6b654334bc3758daa6eb1b9a5faa21bc69ef52e2579f15c1f930d3dd66c162e8e1bc975"}, &(0x7f0000000440)=0x94) setsockopt$inet_sctp_SCTP_AUTH_KEY(r5, 0x84, 0x17, &(0x7f0000000580)=ANY=[@ANYRES32=r6, @ANYBLOB="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"], 0x1008) write$FUSE_STATFS(r0, &(0x7f0000000300)={0x60, 0x0, 0x1, {{0xfffffffffffffff7, 0x100000001, 0x0, 0x1, 0x934, 0x3, 0xfffffffffffff268}}}, 0x60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:45 executing program 0 (fault-call:8 fault-nth:11): pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) [ 1841.646086][ T2490] block nbd4: Attempted send on invalid socket [ 1841.652411][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1841.664068][ T2490] block nbd4: Attempted send on invalid socket [ 1841.670488][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 [ 1841.737491][T12759] FAULT_INJECTION: forcing a failure. [ 1841.737491][T12759] name failslab, interval 1, probability 0, space 0, times 0 [ 1841.750157][T12759] CPU: 1 PID: 12759 Comm: syz-executor.0 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1841.759278][T12759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1841.769382][T12759] Call Trace: [ 1841.772693][T12759] dump_stack+0x172/0x1f0 [ 1841.777044][T12759] should_fail.cold+0xa/0x15 [ 1841.781648][T12759] ? trace_hardirqs_on+0x67/0x230 [ 1841.786690][T12759] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1841.792518][T12759] ? mark_held_locks+0xf0/0xf0 [ 1841.797295][T12759] __should_failslab+0x121/0x190 [ 1841.802258][T12759] should_failslab+0x9/0x14 [ 1841.806765][T12759] kmem_cache_alloc+0x47/0x6f0 [ 1841.811558][T12759] ? lock_acquire+0x16f/0x3f0 [ 1841.816368][T12759] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1841.822636][T12759] skb_clone+0x150/0x3b0 [ 1841.826930][T12759] dev_queue_xmit_nit+0x2f0/0x980 [ 1841.831979][T12759] ? validate_xmit_xfrm+0x42d/0xf30 [ 1841.837200][T12759] dev_hard_start_xmit+0xbb/0x980 [ 1841.842264][T12759] __dev_queue_xmit+0x2a9a/0x36b0 [ 1841.847288][T12759] ? __lock_acquire+0x548/0x3fb0 [ 1841.852246][T12759] ? __kernel_text_address+0xd/0x40 [ 1841.857454][T12759] ? netdev_core_pick_tx+0x300/0x300 [ 1841.862746][T12759] ? ip_do_fragment+0x1d2b/0x2520 [ 1841.867791][T12759] ? find_held_lock+0x35/0x130 [ 1841.872589][T12759] ? ip_do_fragment+0x1d2b/0x2520 [ 1841.877630][T12759] ? mark_held_locks+0xa4/0xf0 [ 1841.882423][T12759] ? ip_finish_output2+0x12b3/0x1740 [ 1841.887715][T12759] ? ip_do_fragment+0x1d2b/0x2520 [ 1841.892758][T12759] ? ip_finish_output2+0x12b3/0x1740 [ 1841.898053][T12759] dev_queue_xmit+0x18/0x20 [ 1841.902546][T12759] ? dev_queue_xmit+0x18/0x20 [ 1841.907217][T12759] ip_finish_output2+0x102d/0x1740 [ 1841.912391][T12759] ? ip_copy_metadata+0xcb0/0xcb0 [ 1841.917425][T12759] ? dst_output+0x180/0x180 [ 1841.921949][T12759] ip_do_fragment+0x1d2b/0x2520 [ 1841.926816][T12759] ? ip_copy_metadata+0xcb0/0xcb0 [ 1841.931854][T12759] ? ip_do_fragment+0x1d2b/0x2520 [ 1841.936884][T12759] ? ip_copy_metadata+0xcb0/0xcb0 [ 1841.941905][T12759] ip_fragment.constprop.0+0x176/0x240 [ 1841.947376][T12759] ip_finish_output+0x5fd/0xd50 [ 1841.952239][T12759] ip_mc_output+0x292/0xf70 [ 1841.956749][T12759] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 1841.961854][T12759] ? __ip_make_skb+0xf15/0x1820 [ 1841.966715][T12759] ? ip_fragment.constprop.0+0x240/0x240 [ 1841.972351][T12759] ? dst_release+0x62/0xb0 [ 1841.976785][T12759] ? __ip_make_skb+0xf93/0x1820 [ 1841.981649][T12759] ip_local_out+0xc4/0x1b0 [ 1841.986079][T12759] ip_send_skb+0x42/0xf0 [ 1841.990351][T12759] ip_push_pending_frames+0x64/0x80 [ 1841.995568][T12759] raw_sendmsg+0x1e6d/0x2f20 [ 1842.000175][T12759] ? compat_raw_getsockopt+0x100/0x100 [ 1842.005669][T12759] ? process_measurement+0xd5d/0x1570 [ 1842.011071][T12759] ? process_measurement+0xd5d/0x1570 [ 1842.016460][T12759] ? ___might_sleep+0x163/0x280 [ 1842.021305][T12759] ? __might_sleep+0x95/0x190 [ 1842.026073][T12759] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1842.031826][T12759] ? aa_sk_perm+0x288/0x880 [ 1842.036560][T12759] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1842.042153][T12759] inet_sendmsg+0x147/0x5e0 [ 1842.046660][T12759] ? compat_raw_getsockopt+0x100/0x100 [ 1842.052147][T12759] ? inet_sendmsg+0x147/0x5e0 [ 1842.056837][T12759] ? ipip_gro_receive+0x100/0x100 [ 1842.061893][T12759] sock_sendmsg+0xdd/0x130 [ 1842.066332][T12759] kernel_sendmsg+0x44/0x50 [ 1842.070863][T12759] sock_no_sendpage+0x116/0x150 [ 1842.075781][T12759] ? sock_kfree_s+0x70/0x70 [ 1842.080319][T12759] inet_sendpage+0x44a/0x630 [ 1842.084915][T12759] kernel_sendpage+0x95/0xf0 [ 1842.089522][T12759] ? inet_sendmsg+0x5e0/0x5e0 [ 1842.094234][T12759] sock_sendpage+0x8b/0xc0 [ 1842.098664][T12759] ? pipe_lock+0x6e/0x80 [ 1842.103021][T12759] pipe_to_sendpage+0x299/0x370 [ 1842.107879][T12759] ? kernel_sendpage+0xf0/0xf0 [ 1842.112671][T12759] ? direct_splice_actor+0x1a0/0x1a0 [ 1842.118020][T12759] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1842.124278][T12759] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 1842.130374][T12759] __splice_from_pipe+0x395/0x7d0 [ 1842.135509][T12759] ? direct_splice_actor+0x1a0/0x1a0 [ 1842.140887][T12759] ? direct_splice_actor+0x1a0/0x1a0 [ 1842.146175][T12759] splice_from_pipe+0x108/0x170 [ 1842.151047][T12759] ? splice_shrink_spd+0xd0/0xd0 [ 1842.156015][T12759] ? apparmor_file_permission+0x25/0x30 [ 1842.161556][T12759] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1842.167806][T12759] ? security_file_permission+0x94/0x380 [ 1842.173470][T12759] generic_splice_sendpage+0x3c/0x50 [ 1842.178767][T12759] ? splice_from_pipe+0x170/0x170 [ 1842.184053][T12759] do_splice+0x70a/0x13c0 [ 1842.189199][T12759] ? opipe_prep.part.0+0x2d0/0x2d0 [ 1842.194336][T12759] ? __fget_light+0x1a9/0x230 [ 1842.199049][T12759] __x64_sys_splice+0x2c6/0x330 [ 1842.206717][T12759] do_syscall_64+0x103/0x610 [ 1842.211315][T12759] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1842.217224][T12759] RIP: 0033:0x458209 [ 1842.221119][T12759] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1842.240814][T12759] RSP: 002b:00007efd8c210c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 1842.249235][T12759] RAX: ffffffffffffffda RBX: 00007efd8c210c90 RCX: 0000000000458209 [ 1842.257225][T12759] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 1842.265212][T12759] RBP: 000000000073bfa0 R08: 0000000000810003 R09: 000000000000000b [ 1842.273189][T12759] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efd8c2116d4 [ 1842.281176][T12759] R13: 00000000004c6fdc R14: 00000000004dbc20 R15: 0000000000000007 03:53:47 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(0x0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:47 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x2) 03:53:47 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x200000000000000) 03:53:47 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x500000000000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:47 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:47 executing program 0 (fault-call:8 fault-nth:12): pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) [ 1843.690154][ T2489] block nbd4: Attempted send on invalid socket [ 1843.696379][ T2489] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1843.707961][ T2489] block nbd4: Attempted send on invalid socket [ 1843.709611][T12780] FAULT_INJECTION: forcing a failure. [ 1843.709611][T12780] name failslab, interval 1, probability 0, space 0, times 0 [ 1843.714195][ T2489] print_req_error: I/O error, dev nbd4, sector 120 flags 0 [ 1843.726792][T12780] CPU: 1 PID: 12780 Comm: syz-executor.0 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1843.726802][T12780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1843.726807][T12780] Call Trace: [ 1843.726832][T12780] dump_stack+0x172/0x1f0 [ 1843.726854][T12780] should_fail.cold+0xa/0x15 [ 1843.765398][T12780] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1843.771212][T12780] ? mark_held_locks+0xf0/0xf0 [ 1843.775976][T12780] ? kasan_check_read+0x11/0x20 [ 1843.780841][T12780] __should_failslab+0x121/0x190 [ 1843.785779][T12780] should_failslab+0x9/0x14 [ 1843.790282][T12780] kmem_cache_alloc+0x47/0x6f0 [ 1843.795044][T12780] ? lock_acquire+0x16f/0x3f0 [ 1843.799716][T12780] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1843.805970][T12780] skb_clone+0x150/0x3b0 [ 1843.810218][T12780] dev_queue_xmit_nit+0x2f0/0x980 [ 1843.815242][T12780] ? validate_xmit_xfrm+0x42d/0xf30 [ 1843.820451][T12780] dev_hard_start_xmit+0xbb/0x980 [ 1843.825493][T12780] __dev_queue_xmit+0x2a9a/0x36b0 [ 1843.830518][T12780] ? __lock_acquire+0x548/0x3fb0 [ 1843.835484][T12780] ? __splice_from_pipe+0x395/0x7d0 [ 1843.840767][T12780] ? splice_from_pipe+0x108/0x170 [ 1843.845790][T12780] ? generic_splice_sendpage+0x3c/0x50 [ 1843.851246][T12780] ? do_splice+0x70a/0x13c0 [ 1843.855833][T12780] ? __x64_sys_splice+0x2c6/0x330 [ 1843.860874][T12780] ? netdev_core_pick_tx+0x300/0x300 [ 1843.866187][T12780] ? ip_do_fragment+0x931/0x2520 [ 1843.871131][T12780] ? find_held_lock+0x35/0x130 [ 1843.875903][T12780] ? ip_do_fragment+0x931/0x2520 [ 1843.880845][T12780] ? mark_held_locks+0xa4/0xf0 [ 1843.885607][T12780] ? ip_finish_output2+0x12b3/0x1740 [ 1843.890896][T12780] ? ip_do_fragment+0x931/0x2520 [ 1843.895838][T12780] ? ip_finish_output2+0x12b3/0x1740 [ 1843.901140][T12780] dev_queue_xmit+0x18/0x20 [ 1843.905651][T12780] ? dev_queue_xmit+0x18/0x20 [ 1843.910423][T12780] ip_finish_output2+0x102d/0x1740 [ 1843.915540][T12780] ? refcount_add_not_zero_checked+0x174/0x240 [ 1843.921704][T12780] ? ip_copy_metadata+0xcb0/0xcb0 [ 1843.926741][T12780] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1843.932992][T12780] ip_do_fragment+0x931/0x2520 [ 1843.937759][T12780] ? ip_copy_metadata+0xcb0/0xcb0 [ 1843.942778][T12780] ? ip_do_fragment+0x931/0x2520 [ 1843.947745][T12780] ? ip_copy_metadata+0xcb0/0xcb0 [ 1843.952784][T12780] ip_fragment.constprop.0+0x176/0x240 [ 1843.958249][T12780] ip_finish_output+0x5fd/0xd50 [ 1843.963111][T12780] ip_mc_output+0x292/0xf70 [ 1843.967626][T12780] ? __ip_queue_xmit+0x1bf0/0x1bf0 [ 1843.972828][T12780] ? __ip_make_skb+0xf15/0x1820 [ 1843.977685][T12780] ? ip_fragment.constprop.0+0x240/0x240 [ 1843.983319][T12780] ? dst_release+0x62/0xb0 [ 1843.987921][T12780] ? __ip_make_skb+0xf93/0x1820 [ 1843.998437][T12780] ip_local_out+0xc4/0x1b0 [ 1844.002861][T12780] ip_send_skb+0x42/0xf0 [ 1844.007102][T12780] ip_push_pending_frames+0x64/0x80 [ 1844.012315][T12780] raw_sendmsg+0x1e6d/0x2f20 [ 1844.016933][T12780] ? compat_raw_getsockopt+0x100/0x100 [ 1844.022415][T12780] ? process_measurement+0xd5d/0x1570 [ 1844.027795][T12780] ? process_measurement+0xd5d/0x1570 [ 1844.033187][T12780] ? ___might_sleep+0x163/0x280 [ 1844.038042][T12780] ? __might_sleep+0x95/0x190 [ 1844.042718][T12780] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 1844.048366][T12780] ? aa_sk_perm+0x288/0x880 [ 1844.052882][T12780] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1844.058433][T12780] inet_sendmsg+0x147/0x5e0 [ 1844.062938][T12780] ? compat_raw_getsockopt+0x100/0x100 [ 1844.068402][T12780] ? inet_sendmsg+0x147/0x5e0 [ 1844.073434][T12780] ? ipip_gro_receive+0x100/0x100 [ 1844.078468][T12780] sock_sendmsg+0xdd/0x130 [ 1844.082906][T12780] kernel_sendmsg+0x44/0x50 [ 1844.087431][T12780] sock_no_sendpage+0x116/0x150 [ 1844.092282][T12780] ? sock_kfree_s+0x70/0x70 [ 1844.096824][T12780] inet_sendpage+0x44a/0x630 [ 1844.101725][T12780] kernel_sendpage+0x95/0xf0 [ 1844.106317][T12780] ? inet_sendmsg+0x5e0/0x5e0 [ 1844.110999][T12780] sock_sendpage+0x8b/0xc0 [ 1844.115417][T12780] ? pipe_lock+0x6e/0x80 [ 1844.119664][T12780] pipe_to_sendpage+0x299/0x370 [ 1844.124511][T12780] ? kernel_sendpage+0xf0/0xf0 [ 1844.129272][T12780] ? direct_splice_actor+0x1a0/0x1a0 [ 1844.134553][T12780] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1844.140832][T12780] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 1844.146909][T12780] __splice_from_pipe+0x395/0x7d0 [ 1844.151931][T12780] ? direct_splice_actor+0x1a0/0x1a0 [ 1844.157220][T12780] ? direct_splice_actor+0x1a0/0x1a0 [ 1844.162504][T12780] splice_from_pipe+0x108/0x170 [ 1844.167357][T12780] ? splice_shrink_spd+0xd0/0xd0 [ 1844.172309][T12780] ? apparmor_file_permission+0x25/0x30 [ 1844.177865][T12780] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1844.184109][T12780] ? security_file_permission+0x94/0x380 [ 1844.190266][T12780] generic_splice_sendpage+0x3c/0x50 [ 1844.195671][T12780] ? splice_from_pipe+0x170/0x170 [ 1844.200723][T12780] do_splice+0x70a/0x13c0 [ 1844.205077][T12780] ? opipe_prep.part.0+0x2d0/0x2d0 [ 1844.210225][T12780] ? __fget_light+0x1a9/0x230 [ 1844.214928][T12780] __x64_sys_splice+0x2c6/0x330 [ 1844.219801][T12780] do_syscall_64+0x103/0x610 [ 1844.224422][T12780] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1844.230345][T12780] RIP: 0033:0x458209 [ 1844.234258][T12780] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1844.253889][T12780] RSP: 002b:00007efd8c210c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 1844.262317][T12780] RAX: ffffffffffffffda RBX: 00007efd8c210c90 RCX: 0000000000458209 [ 1844.270295][T12780] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 1844.278277][T12780] RBP: 000000000073bfa0 R08: 0000000000810003 R09: 000000000000000b [ 1844.286263][T12780] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efd8c2116d4 [ 1844.294253][T12780] R13: 00000000004c6fdc R14: 00000000004dbc20 R15: 0000000000000007 03:53:48 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x600000000000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:48 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) getsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000000000)={@loopback, @loopback, 0x0}, &(0x7f0000000080)=0xc) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xa) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r4 = socket$inet(0x2, 0x0, 0x1) lsetxattr$trusted_overlay_origin(&(0x7f0000001880)='./file0\x00', &(0x7f00000018c0)='trusted.overlay.origin\x00', &(0x7f0000001900)='y\x00', 0x2, 0x2) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0xe1, 0x7, 0x7ff}, 0x10) seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000280)=[{0x200000006, 0x0, 0x0, 0xfffffffffffffffd}]}) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) getsockopt$sock_buf(r4, 0x1, 0x3b, &(0x7f0000000480)=""/19, &(0x7f00000004c0)=0x13) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000001780)="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") getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000001a40)={'ah\x00'}, &(0x7f0000001a80)=0x1e) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000001580)={{{@in6=@local, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000500)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000001680)={{{@in=@multicast1, @in6=@remote, 0x4e20, 0x5, 0x4e20, 0x8, 0xa, 0xa0, 0x7cd4b970fb2bbac6, 0x67, r3, r5}, {0x9, 0x311d, 0xcfd2, 0x9abc, 0x80, 0x9, 0x2, 0x80}, {0x2e0, 0x80000000, 0x5ed, 0xff}, 0x3, 0x6e6bb1, 0x1, 0x0, 0x1, 0x3}, {{@in6=@empty, 0x4d2, 0x33}, 0xa, @in6=@rand_addr="4a0868933c135b383b2c9fc9bb548102", 0x3505, 0x2, 0x2, 0x2, 0x401, 0x9, 0x9}}, 0xe8) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000001940)={0x0, 0xffff, 0x1, [0x7fffffff]}, &(0x7f00000019c0)=0xa) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000001a00)={r6, 0x20, 0x6, 0x80000001}, 0x10) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) syz_mount_image$ceph(&(0x7f0000000140)='ceph\x00', &(0x7f0000000180)='./file0\x00', 0x7ff, 0x5, &(0x7f00000003c0)=[{&(0x7f00000001c0)="0eb81dff782f8b46087c538bbe445bc651662f0a617f0ee06495f51d56bbe8161d2d2290e8025b", 0x27, 0x1f}, {&(0x7f0000000200)="972ae1ab0fcae8639475b73aa99e3e2bdfaf6ec226b73c3def3de5db74b59e20944f3125ef", 0x25, 0x89}, {&(0x7f00000002c0)="19844bf727d2cf9485d4df29e679f88c698fc2c9fac37aa5c520baff2c4bdef8bed6b230e0b2d8e36e7f6312c2fbafd81cce36719b17e28cd0b0486dd23db5757420d7deebac8deff0cea848290617e5edbb27801dc4026c9819a2c14a4760a24609596da0c9b76f5bca7a5f90232867d36c1c070f30031d60b42996030c37b973d863b542a76902e257eb037fdd59740ed68347c0f1c4ce79c6fd28d07f6e4e2c9b28b932a10814571434b84808115322fa473cea017a7ef974a3413cfa6642302ce707def6b87932ae0b9bf18a0ecf4d5df01b75efde2ac50610ea1f2b62c3ad9c2332c7a02e2e6381587d11d2a331c6ae75ff63", 0xf5, 0x3}, {&(0x7f0000000240)="997908eb5250a2e880a638bd936705f399ac5eec2f34ef5097bca2b392d56bfb07c7f4", 0x23, 0xc2}, {&(0x7f0000000580)="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", 0x1000}], 0x88010, &(0x7f0000000440)='\x00') 03:53:48 executing program 3 (fault-call:12 fault-nth:0): sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:53:48 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x8cffffff00000000) 03:53:48 executing program 0: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) [ 1844.592560][ T2489] block nbd4: Attempted send on invalid socket [ 1844.598870][ T2489] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1844.607217][ T2489] block nbd4: Attempted send on invalid socket [ 1844.613738][ T2489] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:53:48 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x700000000000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1844.802111][T12809] FAULT_INJECTION: forcing a failure. [ 1844.802111][T12809] name failslab, interval 1, probability 0, space 0, times 0 [ 1844.921663][T12809] CPU: 0 PID: 12809 Comm: syz-executor.3 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1844.930859][T12809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1844.940927][T12809] Call Trace: [ 1844.944262][T12809] dump_stack+0x172/0x1f0 [ 1844.948707][T12809] should_fail.cold+0xa/0x15 [ 1844.953330][T12809] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1844.959172][T12809] ? ___might_sleep+0x163/0x280 [ 1844.964138][T12809] __should_failslab+0x121/0x190 [ 1844.969109][T12809] should_failslab+0x9/0x14 [ 1844.973657][T12809] __kmalloc_track_caller+0x2d8/0x740 [ 1844.979065][T12809] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1844.985350][T12809] ? fput_many+0x12c/0x1a0 [ 1844.989813][T12809] ? strndup_user+0x77/0xd0 [ 1844.994355][T12809] memdup_user+0x26/0xb0 [ 1844.998660][T12809] strndup_user+0x77/0xd0 [ 1845.003019][T12809] ksys_mount+0x3c/0x150 [ 1845.007292][T12809] __x64_sys_mount+0xbe/0x150 [ 1845.012000][T12809] do_syscall_64+0x103/0x610 [ 1845.016625][T12809] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1845.022567][T12809] RIP: 0033:0x458209 [ 1845.026692][T12809] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1845.049994][T12809] RSP: 002b:00007fa45f36cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1845.058418][T12809] RAX: ffffffffffffffda RBX: 00007fa45f36cc90 RCX: 0000000000458209 [ 1845.066490][T12809] RDX: 0000000020000a40 RSI: 00000000200005c0 RDI: 0000000000000000 [ 1845.074475][T12809] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1845.082459][T12809] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa45f36d6d4 [ 1845.090446][T12809] R13: 00000000004c3faa R14: 00000000004d7240 R15: 0000000000000004 [ 1845.128323][ T26] audit: type=1326 audit(2000001228.889:61): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12793 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 [ 1845.258468][ C0] net_ratelimit: 16 callbacks suppressed [ 1845.258477][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1845.270631][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1845.278055][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1845.284942][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1845.292596][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1845.300212][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1845.338340][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1845.344702][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1845.417821][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1845.423693][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1845.476471][ T26] audit: type=1326 audit(2000001229.229:62): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12793 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45b06a code=0xffff0000 03:53:50 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x800000000000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:50 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(0x0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:50 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0xf6ffffff00000000) 03:53:50 executing program 3 (fault-call:12 fault-nth:1): sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:53:50 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x40080, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x2cda}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000080)=""/95) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:50 executing program 0: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810002, 0xb) 03:53:50 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x900000000000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1846.705325][ T2490] nbd_handle_cmd: 2 callbacks suppressed [ 1846.705342][ T2490] block nbd4: Attempted send on invalid socket [ 1846.717515][ T2490] print_req_error: 2 callbacks suppressed [ 1846.717528][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1846.731485][ T2490] block nbd4: Attempted send on invalid socket [ 1846.737991][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 [ 1846.849404][ T2490] block nbd4: Attempted send on invalid socket [ 1846.855716][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1846.863795][ T2490] block nbd4: Attempted send on invalid socket [ 1846.870969][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 [ 1846.890338][T12851] FAULT_INJECTION: forcing a failure. 03:53:50 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0xffffffffa0008000) [ 1846.890338][T12851] name failslab, interval 1, probability 0, space 0, times 0 [ 1846.914643][T12851] CPU: 1 PID: 12851 Comm: syz-executor.3 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1846.923824][T12851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1846.933896][T12851] Call Trace: [ 1846.937213][T12851] dump_stack+0x172/0x1f0 [ 1846.941578][T12851] should_fail.cold+0xa/0x15 [ 1846.946549][T12851] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1846.952373][T12851] ? ___might_sleep+0x163/0x280 [ 1846.957214][T12851] __should_failslab+0x121/0x190 [ 1846.962148][T12851] should_failslab+0x9/0x14 [ 1846.966647][T12851] kmem_cache_alloc+0x2b2/0x6f0 [ 1846.971495][T12851] ? __might_fault+0x12b/0x1e0 [ 1846.976248][T12851] getname_flags+0xd6/0x5b0 [ 1846.980745][T12851] user_path_at_empty+0x2f/0x50 [ 1846.985582][T12851] do_mount+0x150/0x2c40 [ 1846.989814][T12851] ? copy_mount_string+0x40/0x40 [ 1846.994746][T12851] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1847.000982][T12851] ? _copy_from_user+0xdd/0x150 [ 1847.005864][T12851] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1847.012091][T12851] ? copy_mount_options+0x280/0x3a0 [ 1847.017276][T12851] ksys_mount+0xdb/0x150 [ 1847.021519][T12851] __x64_sys_mount+0xbe/0x150 [ 1847.026185][T12851] do_syscall_64+0x103/0x610 [ 1847.030785][T12851] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1847.036660][T12851] RIP: 0033:0x458209 [ 1847.040553][T12851] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1847.060154][T12851] RSP: 002b:00007fa45f36cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1847.068555][T12851] RAX: ffffffffffffffda RBX: 00007fa45f36cc90 RCX: 0000000000458209 [ 1847.076714][T12851] RDX: 0000000020000a40 RSI: 00000000200005c0 RDI: 0000000000000000 [ 1847.084678][T12851] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1847.092644][T12851] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa45f36d6d4 03:53:50 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xa00000000000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1847.100605][T12851] R13: 00000000004c3faa R14: 00000000004d7240 R15: 0000000000000004 03:53:51 executing program 3 (fault-call:12 fault-nth:2): sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:53:51 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x2000000000000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1847.200824][ T2490] block nbd4: Attempted send on invalid socket [ 1847.207235][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1847.216276][ T2490] block nbd4: Attempted send on invalid socket [ 1847.222737][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 [ 1847.351121][ T2490] block nbd4: Attempted send on invalid socket [ 1847.357438][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1847.366983][ T2490] block nbd4: Attempted send on invalid socket [ 1847.373508][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 [ 1847.379059][T12862] FAULT_INJECTION: forcing a failure. [ 1847.379059][T12862] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1847.393951][T12862] CPU: 0 PID: 12862 Comm: syz-executor.3 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1847.403064][T12862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1847.413124][T12862] Call Trace: [ 1847.416432][T12862] dump_stack+0x172/0x1f0 [ 1847.420874][T12862] should_fail.cold+0xa/0x15 [ 1847.425469][T12862] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1847.431282][T12862] ? __lock_acquire+0x548/0x3fb0 [ 1847.436229][T12862] should_fail_alloc_page+0x50/0x60 [ 1847.441441][T12862] __alloc_pages_nodemask+0x1a1/0x7e0 [ 1847.446831][T12862] ? __alloc_pages_slowpath+0x2900/0x2900 [ 1847.452571][T12862] ? find_held_lock+0x35/0x130 [ 1847.457358][T12862] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1847.463183][T12862] cache_grow_begin+0x9c/0x860 [ 1847.467954][T12862] ? getname_flags+0xd6/0x5b0 [ 1847.472645][T12862] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1847.478900][T12862] kmem_cache_alloc+0x62d/0x6f0 [ 1847.483852][T12862] ? retint_kernel+0x2d/0x2d [ 1847.488458][T12862] getname_flags+0xd6/0x5b0 [ 1847.492995][T12862] user_path_at_empty+0x2f/0x50 [ 1847.497862][T12862] do_mount+0x150/0x2c40 [ 1847.502130][T12862] ? copy_mount_string+0x40/0x40 [ 1847.507073][T12862] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1847.513344][T12862] ? _copy_from_user+0xdd/0x150 [ 1847.518223][T12862] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1847.524499][T12862] ? copy_mount_options+0x280/0x3a0 [ 1847.529726][T12862] ksys_mount+0xdb/0x150 [ 1847.533976][T12862] __x64_sys_mount+0xbe/0x150 [ 1847.538683][T12862] do_syscall_64+0x103/0x610 [ 1847.543287][T12862] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1847.549182][T12862] RIP: 0033:0x458209 [ 1847.553080][T12862] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1847.572709][T12862] RSP: 002b:00007fa45f38dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1847.581130][T12862] RAX: ffffffffffffffda RBX: 00007fa45f38dc90 RCX: 0000000000458209 [ 1847.589106][T12862] RDX: 0000000020000a40 RSI: 00000000200005c0 RDI: 0000000000000000 03:53:51 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x3, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000100)='./file0/file1\x00', &(0x7f0000000140)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='bpf\x00', 0x4, 0x1) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 1847.597081][T12862] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1847.605060][T12862] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa45f38e6d4 [ 1847.613039][T12862] R13: 00000000004c3faa R14: 00000000004d7240 R15: 0000000000000004 03:53:51 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:53 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(0x0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:53 executing program 0: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810004, 0xb) 03:53:53 executing program 3 (fault-call:12 fault-nth:3): sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:53:53 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x2010000000000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:53 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000340)='/dev/vbi#\x00', 0x0, 0x2) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000600)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000a27bd7000fddbdf25016c66d7a1d13c0f46150000000000000001410000001800170000000400000007756470"], 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x24000805) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:53:53 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) getsockname$unix(r0, &(0x7f0000000080)=@abs, &(0x7f0000000000)=0x6e) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x810003, 0xb) [ 1849.761792][ T2489] block nbd4: Attempted send on invalid socket [ 1849.768138][ T2489] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1849.780427][ T2489] block nbd4: Attempted send on invalid socket [ 1849.786742][ T2489] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:53:53 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x2300000000000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:53 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:53 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:53:53 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x3f00000000000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:53 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) umount2(&(0x7f0000000100)='./file0\x00', 0x1) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() socket$vsock_dgram(0x28, 0x2, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:53:53 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:53 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x4000000000000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1850.537801][ C1] net_ratelimit: 24 callbacks suppressed [ 1850.537810][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1850.549400][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:53:54 executing program 0: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810009, 0xb) 03:53:54 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x2, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:53:54 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x7fffffffffffffff}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:54 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000280)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000380)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@local}}, &(0x7f0000000480)=0xe8) accept4$packet(0xffffffffffffff9c, &(0x7f0000000740)={0x11, 0x0, 0x0}, &(0x7f0000000780)=0x14, 0x80000) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000007c0)={0x0, @rand_addr, @broadcast}, &(0x7f0000000840)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000008c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000940)=0x14) accept(0xffffffffffffff9c, &(0x7f0000000980)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a00)=0x80) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000a80)={{{@in6=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@dev}}, &(0x7f0000000b80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000002ec0)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002fc0)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@empty}}, &(0x7f00000030c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000047c0)={{{@in=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f00000048c0)=0xe8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000004900)={'ifb0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000004940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000004980)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000004a80)={{{@in6=@empty, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000004b80)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000004d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004d40)=0x14) accept4(0xffffffffffffffff, &(0x7f0000004d80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004e00)=0x80, 0x80000) accept4$packet(0xffffffffffffffff, &(0x7f0000004e40)={0x11, 0x0, 0x0}, &(0x7f0000004e80)=0x14, 0x800) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000005780)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000005740)={&(0x7f0000004ec0)=ANY=[@ANYBLOB='T\b\x00\x00', @ANYRES16=r3, @ANYBLOB="00042abd7000fedbdf250300000008000100", @ANYRES32, @ANYBLOB="b605020038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400ffff000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000100000008000600", @ANYRES32=r4, @ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="080007000000000008000100", @ANYRES32=r6, @ANYBLOB="f400020038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400070000004400010000000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000000000300060000000000040000000600", @ANYRES32=r4, @ANYBLOB="3c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000038000100240001006e6f746966795f70656572735f696e74657276616c000000000000000000000008000300030000000800040000000000c0010100", @ANYRES32=r7, @ANYBLOB="7c0002003c000100240001006c625f74785f6d6574686f6400000000000000000000000000000000000000000800030005b200000000040068617368000000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r8, @ANYBLOB="08000100", @ANYRES32=r9, @ANYBLOB="60020200400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000000000008000600", @ANYRES32=r10, @ANYBLOB="90fd0100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r11, @ANYBLOB="080007000000000070fe80002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000700080004000100000008000600", @ANYRES32=r12, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e00000008000400ff53712808000600", @ANYRES32=r13, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r14, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000900000038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400080000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r15, @ANYBLOB="400001002400010071756575655f6964000000000000000000000000000000000000000000000000080003000300000008000400ffffff7f08000600", @ANYRES32=r16, @ANYBLOB="38000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400ff7f000008000100", @ANYRES32=r17, @ANYBLOB="2c01020040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e63650038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000000000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000008000008000600", @ANYRES32=r18, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000104000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400ffff000008000100", @ANYRES32=r19, @ANYBLOB="f80002003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r20, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400feffffff400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000800000008000600", @ANYRES32=r21, @ANYBLOB="40000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e636500"], 0x854}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:53:54 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) ioprio_get$pid(0x2, r3) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) write$P9_RLCREATE(r1, &(0x7f0000000000)={0x18, 0xf, 0x2, {{0x0, 0x3, 0x7}, 0x9}}, 0x18) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:54 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x8cffffff00000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:54 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0xf0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:53:54 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40000) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f00000001c0)={'broute\x00'}, &(0x7f0000000240)=0x78) r1 = getpgrp(0x0) process_vm_writev(r1, &(0x7f0000000c80)=[{&(0x7f0000000600)=""/119, 0x77}, {&(0x7f0000000680)=""/195, 0xc3}, {&(0x7f0000000780)=""/116, 0x74}, {&(0x7f0000000840)=""/236, 0xec}, {&(0x7f0000000940)=""/217, 0xd9}, {&(0x7f0000000a80)=""/205, 0xcd}, {&(0x7f0000000480)=""/39, 0x27}, {&(0x7f0000000b80)=""/223, 0xdf}], 0x8, &(0x7f0000000d80)=[{&(0x7f0000000d00)=""/101, 0x65}, {&(0x7f0000001a00)=""/4096, 0x1000}], 0x2, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) r2 = perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x11000, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x3}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000340)={r3, 0xbae8}, 0x8) lstat(&(0x7f0000000380)='./file0/file0\x00', &(0x7f0000000500)) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:53:54 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xf4ffffff00000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:54 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xf5ffffff00000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1851.497811][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1851.503722][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1851.509670][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1851.515457][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1851.521382][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1851.527168][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1851.657809][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1851.663681][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:53:56 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:56 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0xedc0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:53:56 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000100)) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000280)='./file0/file0/file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000200)) gettid() fcntl$getownex(r0, 0x10, &(0x7f0000000240)) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000500)='/dev/full\x00', 0x2000, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000540)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000380)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000480)=0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x8, 0x0) socket$nl_route(0x10, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:53:56 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xf6ffffff00000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:56 executing program 0: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) pwrite64(r1, &(0x7f0000000580)="dcb0dfcc3a9b39d14ac84e928a4c6df9d3f2dee1ad5d3ac6351118d60ef1aa6bea4e8ec2d0fc9589c4011098fe6985056e419097b216fc1299467ce2b66eecd68109f2dfc0dcd98c525a0097b62f44a7766622234bd3cc497807c3fe7f9b7c91d5db0f68398bd830d47cbfc27bd25ed8c5b6e04a18c5e1a354c9a43a425ce0e908a34ab15da4eb625cd816cb10f607a688db739082887dcba4d1903d2243001deb3198803992aeb6edd90f047636462df43750697507ca09e06460083ef3331e102727ace45df82e12938397d77ac15cfdf3fae6736f61796080b6dba4bab2416e22e05df72fa5c4796369c3c0e81e46502b659a30b06a0dea295bc6403e75f8ac7be2f86d788bf87764cc8fd5ecfb0d2e8ac839b51348f57d3d51565c4e032bad47f095b38db1d33b10ca18e0fed2507d02769515f7be9b4554e90feb8eed37c03586e3e2a9af59229b00f8af5f4fbe29582429669a76617b19802519f7072df7fa3e4623b6dc4e8215c14dc40b5ad8b4416244d30184a2db517fbfbe88f8e67efb63cddf2b57e75c3f21276078a4ecc117f8c9f8c9cf2aa6b2945b193c182413ceabacce009af68d9787167ba5fa8bd106b31f10d0f07a3b437fad256c6d6e4abd78dbf46c5f76d7df3a0e58509b86c80d0ee7fc2e683695a7c82609868c2afaecb15c27771211717284dd69512b77240fd7942938ea51163d7f067db8b39baf75fec0a6a766ae8ebc9463d76f471164468f269a23dde368c306699fe73be03b95a80b02030f7cba38e976fa2a22b233edbcdaf67f52d62ab5cc3d9a2f59e304c57720bfaa0e64fb84b3fbda8386a49d70a440e1a7d3bd6a9e96a0143b442c6e08255ec5a06bc12acaac0a7287f1db1fd5dbeca35e7c125f9aebcf3f6e76442642033240688a48a3ebea7d28438d66280f9316e3dc3ef02ed921d8964c4f25f5b4f7b8a5d1552285a64a4a8b5ee38f8b36f2f67f9a4a13fd509606b1f736d067e06fedabe800c4f7fb05fa7f834433252a0891a1d60fb33f7b197c6b3839a42a12bf6b8be791c50eab72d91d102d15066d7c33e4a443b6e301b0a621696f16a9bd8f1027d8efd82b2641f63dc3e6a8d200de73c770b14613efc5d2570a8e58398cf373849351ef77ec5bdde4604439d4357b1b7a647c70fc71148d30ad6b91d5134ab4099b44cc3993788c25b876a90f6a60a7d029b8f88e574bf43a507c3320806912b86ca04b21372d6c8d104973b73742da720e95e9fe7c20095975b39e23106b8f7a5431b7232ab2ccce11bff4469dd8192afe03d09d8dfbd50c167b4e9caef276bf9335618b2ed1d038e60a787e1ade5d531c33d13c05cc6441938cdb89ca7c15ac5ce9cc28bf9d5a110ccfeb12c92442ee2f8bdc1676bac3837769c32f88f8e8bdf8bd6cf261a379f40f24fbbb22dbb7345b123778a2068c15363540e3b21a4b347f9ad04e6b182b4c1cf5401d5cdda0e118532a1baad36663aa3230664bdcd3df27e689264dfd1d23f39056654773efa2edc9e7973f136464718b3e268592a3938c75ede3814f7edf5c2590a1aca874ecf4ed5a09b999f545d954251e0d2a064f37d846b522bb22638161e17aafa603359650080e28a0cd54c9f084095f4244dd818a5022e7f21b347b28e78cdfea610fcc2b5b6cef674dfb27f5c3b9bdbd97c33963ff555188d55993bb19bf41efd41e93509fff22cfe60c7d127981a378a3fdbfdd5e9ce8103eeb336eacb165b61f74296f4967148edcc98850f62d16fc64aa78782ec700f4e30711de91d2c29edcc4fbe8ec45143a3ac644351aafb2db81898a7e97dec2ed92ebf9c5c077d6a99ae67e929820e472ca2383ed5d208c498889e2dd4a2621a552eaa7dd575b6edc7da9efdb26043fc969565c97bb6924b3fed734b2d89209193074918692aba3b87748d64359ef942770e74f73ce4e31bdd04cdbcc18804ab0d6b92c822626fd81f277017eeb367bf5132cf1d99b6d6e232b978685c7f56905852e9803c5ba857bbda85af287c1367523c89f0dfdfad793f4fd539864efe57c8d0671d1042e1a658ec17b32f156a045c325d5c7db992853a740bede72d62d8e5df655f0cab1c37deab193a8dcdabdf169b39fd191bc1df53074a5e193741ae05dee887c9693062f2763ad4916bbc3d501fa825f7a40c5395d6ff95c741b16e57220d1bcb3348e0f2e9ebc5cba9daa262e2577d54e8af3ec55f7cf4bba57be3e83d6f36e002745ce37b714bef3c1e1e528ca546b0cdf53569a75675bce88a8b9be787a5752dd45dce85ae96b2a7a99962f66a9d26a44c6eeecf6e3a691c507c0748ddd8f912a2bd19ee99f06e8c353b11381eb5ce87103d0611a5e8aa43933981806bd473fe2e05dc618606d1c0708ce6af6b9d62a4a4c280e491e47d60811b45580ed30aeaaa34c80e8ebaea21e88dbc2665a97f0125820b5c59ac2e71312c2a84487b6418b402b883e90c7ed9b77fae226e7dafa29f3085b6c3ce4cbc4ccd826e5db865e71a67f05fd9f014e82dc67db85e34c3654519df361c7ac9e6744982e94b59c1ebb2f9957f1c0995c96ebfdf1ef334b3d56ad310dee7c1bf8a3ade91261932386b44113607f6719b2cee69b070c26e99c1623aa79b0304385f3b5c5ed3aa8e63ecf7e2f1a955e53a1e3c3e27f02ad940705b9c66573d8814aed672b81282b6a4940ed60d46a887bc77537d1e3f77b3ab01d73b35b80c6ea2d0a68a69bba5f42b7574e807a50f6858fe4029cef749d79b06396df35faca380026203843fb7c4b82cd03c470e58d78376a30829ca4f3bb7edf6774995cb5042fecce5f94eee880beee934b98b64385f8620826ef991e2223afae6bc20fc358bc57a0fc287a2aac957fa5b0b1b65fc3a6013af0a1c6f2d88135059a7c599504f034ff696d4d56e87a50badf5f6f93b8033ead08be045b9035470ed7da15cf336f8a2448f447e0fdfc01d498e3a09758f5b595179cb23325dfa3a971870561fa8dcdae448a9088bd7da2464b0d26f946ff49c9b6bf6f9a23260309dc9f14f2d26fb8c8350350bf61c99515e86522cf931ef5139650f9fd79f53c2c4358a4b642d386b4bba8d6657b62f5ecaa6b703ebaab0ef09171ef266c220baee9f6e1acc40e379dc11569ccf057f63f7e391e66f5b399bc4f9eedcee68f48bcefba548b1e3d3e2aa40f7a3485e6aab1065d39639ec7839ee1e07f4bd1f2c1bff466f741e7be2cfb202cade15d05030d7584237de05fc4250bf2e25054f7e2a8b3facffe35cbb7b68f708ff6a0832481858368073822780fc1d0c7e447fad3716fa5f9317bcc1601554c46bb9d1b757297156bdcbdcee784066edb21da26ef0930041f85621dc28ebbfc773892978622ae6e2706b07d6a348ac96edcbe11cf4039acd5d397ae44e1f84b740cb9df569d60cd5fad4f685ab5b925369bfdb776c722d6e13dc736ccde26f8e41c842e364f8cc2bfbe6911ba22bcc7cec00191859f655a9cb3c4ad61d4ddcb19d5643ba03ac97f54354da8d11a1cc4c2fed4f510bda4f111a0b1e21bc53e78c95717277da9915a42cf539474100e9c8ab5e4a2595e0c87232390a92f29399c40c20229414139445c7cd0ccc1c9eb95ca2692c19be3426f4f5c7d077ffc68076f2dd321faa619988748359ffc395334644b7580ea981be2396c3624f0d8a3b0b948a2358d1e0926e87f2aded53cf0ef6b69de4dcae135a6d9c398146fe4ad819888b65acca0bae664e22b6457b22f81ee50b9c89c209f07042bf6e47cd3a2d72056560eccae9fa8408dd7d65b4ca0fca7054100ee2e77769d921dd98da2a900053398fe8c0eaac36d3a327dcbe37bd82c0afc28d7a8d79224b94c36bffeac4c4f8b3ea4d7d1ad8b54e3b30d7718934d653dfc68447dd9dd7127a40570061d6d8323c8690af922c6c1a4bea6f6b1153776434d5453c002361085a3da482fb8e5010517d98e04c97cc6ddcf9f99c19a29c2ace40dd72a381bf1218a086982de5462bb7d88001a1c61d6441017c4cf9b55d555bd1cdde9606d24a68673caa148cd68e9311f31f0f55445d733bac3d1b823fb8b3b64f582850067d03e57daf5699dd0c96ee25a40665923ba225d3a7ad690d1ec7f99027f9b8ae499aee21ae723be788fd3de4a21a4070f3c4e6ff33ea46abc6751297f3b5499dabb59edd7b199e6b74421b7728544e3525a60045e94118522e05a8707bc13ca48d057f40b87e0f211bea1834a8616fe99d436b66a4ac71a280d9d0de4117e825feb91f7ef6f6308591e1c5305a54a398ac090ffba292b530980db3e312dd0040388db8b851caafa54fa7283a3e083c1f479965dfc04f786a603979d79f45e65308a8b3073778cb4ff26e88548a0a98c503ec95b228646a15336b08d45a50b2d0187262bdc024865adec7c3ac66e44a33d783afa84d93dd3824c8c8a7d3e781977d58163e4fc6ef8e5fdb47ca52ec6e17d379cff20c58b33c4628a0ac59dafb5b5a1c1a25aa38145bda50e7a3f1b1823d21939ab1c6d1b880aed10be776503dd7446613e4796ee5db25f9dde4889623c19059a2f2ac8a0044f9691ec99a82b1ea6eb6fd0e80b15aa0dd93b2628c1a277ad7334afa73a08ce43cb873da4ea8d1b2a8fb8b3890d22e7717f1c69bc84b9be1036c1ed43906c0a0d9b1e0b827d1be8cca79a1da1642a3186a17e674ddcf13e3e3606a66f00f5d6045122492b7b72a77b40b0565ba8514612e5a76e6e2680b249e398034906c5f2f2fc8e2d02227e1bb3f5433a623ff4cac51ba0bb87676cccd2c02e1dddf239bea9fa40d0fbc8a55528e052832a3cbe3ed99a261b8f47bb3ef746751b247e2630a5ca0b8ba7dd49b70308400682ff1aedef41ea8b24e1ff86f9c5b88571f5f9569b7bc1ec64a0893cc9588d034c653b84723b0d41af6db948b5a800241000b9e9e8edc39360ce89c90d575c7424936670cdbe79ec2cff014fd8c849a94abf9be6978d723da6c34b87115c564f96cbf9805e17a9d15f48f29d5878ffabf22d77de4fc2a99ca5101e947a6a23999edc77244f2e529190c6606e422dacf8b1b3e94c12e129852460a6390e962a112d4ff30795a6d46dd042790b7bb2f61ba023c37a54aff28c7feda9df9edada8872ad0e1e110f4f94d24d5b09dc44f4fe638e92fd4aa15ad1e9576b7055ad4bb33987ec8eb91b7ee4b07e8a99cfbf3e4f8822c364427037a00fedadebc88277e892b13326578d50532c506a9af6cc64628cc9a16e249fcf3030300f000d20f09488ba5ba64318b6875ba843c6b5045312dd8938bed0fec68b7f2786301e360be4217ef99fe79d6a68c127af0701aa567d39b0c72ad257c83f8adcb4b7f09a6aa34ccb05598ba507b259bee61ea14a0772bdb253036d6ed52136632566e3b9b64642e08b2a3deda0f225074d379914994e613ee1c7bae11aec3abce5075ab2fd9403c65df6264d075247c7d853ad4245d24c361e37d21ce378585e5ea39b34668028c20b34f97119af1039acb91560c81e18dfb71cb9301ad212ee3527b0766196628ec0199fc908a7adda95aaa65c54bbb42f5ef1dfdc65aa5f232505d97f159af7d968d54aeadfa6c790a0f6cf6185c0ef57a42622e6ba5275aa6c1e8f3a07c6a18093668ac45b56979dfde2c03b3dce86c27905a184e8b14f00fd6ca707877e4e9bc81158f71a55d33a657e779451306348af9e69f22911460bdfb30f41b0d97c549eb66bbde2ed218962ae7ca920dc994522a0d54d926b52e3fbb0762f4e54d7f836c53f7bb0858eefacda0fe3dec747fbc97417008001", 0x1000, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:56 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) getgid() connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) [ 1853.184551][ T2490] nbd_handle_cmd: 12 callbacks suppressed [ 1853.184615][ T2490] block nbd4: Attempted send on invalid socket [ 1853.196863][ T2490] print_req_error: 12 callbacks suppressed [ 1853.196875][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1853.218227][ T2489] block nbd4: Attempted send on invalid socket [ 1853.224489][ T2489] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:53:57 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xf9fdffff00000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:57 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0xf000, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:53:57 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x600180, 0x0) getsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000140), &(0x7f00000001c0)=0x4) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:53:57 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xfbffffff00000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1853.376023][ T2490] block nbd4: Attempted send on invalid socket [ 1853.382435][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1853.393438][ T2490] block nbd4: Attempted send on invalid socket [ 1853.400100][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:53:57 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xfeffffff00000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1853.554213][ T2490] block nbd4: Attempted send on invalid socket [ 1853.560789][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1853.571356][ T2490] block nbd4: Attempted send on invalid socket [ 1853.577810][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:53:57 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000180)='procsecurityproc\x00', 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x13, r2, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x0, 0x40000000, 0x0, 0x0) sendmsg$alg(r1, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000380)='./file0/file0\x00', 0x0, 0x2001003, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) mknod$loop(&(0x7f0000000100)='./file0/file0\x00', 0x88, 0x1) r6 = creat(&(0x7f0000000240)='./file0/file0\x00', 0x21) getsockopt$inet_pktinfo(r6, 0x0, 0x8, &(0x7f0000000280)={0x0, @broadcast, @multicast1}, &(0x7f0000000340)=0xc) setxattr$security_smack_entry(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='security.SMACK64IPOUT\x00', &(0x7f0000000200)='bpf\x00', 0x4, 0x2) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) [ 1853.716362][ T2490] block nbd4: Attempted send on invalid socket [ 1853.723655][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1853.732101][ T2489] block nbd4: Attempted send on invalid socket [ 1853.738488][ T2489] print_req_error: I/O error, dev nbd4, sector 120 flags 0 [ 1855.657793][ C0] net_ratelimit: 16 callbacks suppressed [ 1855.657802][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1855.669382][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1855.675231][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1855.681072][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1855.686931][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1855.692767][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1855.817755][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1855.823580][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1855.897776][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1855.903568][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:53:59 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:53:59 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x8000a0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:53:59 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xff0f000000000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:53:59 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:53:59 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x20) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:53:59 executing program 0: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) futimesat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{}, {0x77359400}}) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000140)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000180)=0x28) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f00000001c0)={r4, 0x8000}, 0x8) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000200)={0x0, r0, 0x4, 0x3}, 0x14) splice(r3, 0x0, r2, 0x0, 0x7f, 0xb) [ 1856.250530][ T2489] block nbd4: Attempted send on invalid socket [ 1856.256726][ T2489] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1856.264809][ T2489] block nbd4: Attempted send on invalid socket [ 1856.271122][ T2489] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:54:00 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xffff000000000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:54:00 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='bpf\x00', 0x1, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x80, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000240)='/dev/admmidi#\x00', 0x2, 0x82000) ioctl$VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000280)={0xa, 0x3f, 0x1800000000, 0x84800, r1}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000100)='bpf\x00', 0x7fffd, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:00 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xffffff7f00000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:54:00 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0xf0ffff, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:00 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xffffffff00000000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:54:00 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x1000000, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:03 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:54:03 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xffffffffa0008000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:54:03 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x208000, 0x182) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:03 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x2000000, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:03 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) fremovexattr(r0, &(0x7f0000000000)=@known='trusted.overlay.opaque\x00') setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000100)={@dev={0xac, 0x14, 0x14, 0x18}, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xc) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:54:03 executing program 0: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=0x0, &(0x7f0000000080)=0x4) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f00000000c0)=r3, 0x4) write$P9_RFSYNC(r1, &(0x7f0000000140)={0x7, 0x33, 0x1}, 0x7) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) [ 1859.308635][ T2490] nbd_handle_cmd: 10 callbacks suppressed [ 1859.308652][ T2490] block nbd4: Attempted send on invalid socket [ 1859.320917][ T2490] print_req_error: 10 callbacks suppressed [ 1859.320927][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1859.335183][ T2490] block nbd4: Attempted send on invalid socket [ 1859.341762][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:54:03 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xffffffffffff0700}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1859.365343][ T2490] block nbd4: Attempted send on invalid socket [ 1859.371901][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1859.379753][ T2489] block nbd4: Attempted send on invalid socket [ 1859.386010][ T2489] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:54:03 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:insmod_exec_t:s0\x00', 0x23, 0x2) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x800) recvfrom$unix(r0, &(0x7f0000000240)=""/127, 0x7f, 0x40000022, &(0x7f0000000340)=@abs={0x1, 0x0, 0x4e24}, 0x6e) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() syz_mount_image$f2fs(&(0x7f0000000480)='f2fs\x00', &(0x7f0000000500)='./file1\x00', 0x2, 0x4, &(0x7f0000000840)=[{&(0x7f0000000600)="3674bb8905f29c31def6fc2b88bb6d2caba0a85caebadb16c60b127f12737529da52e735c3b87d7d7cee081d631caa75d6cc3640da71c27a37cdfb73b4ffe91821674cab3db604016e465c185e0bfb8c592f5c03114e4bdc49bba328f9d5aee602ea0040205505fc2c37fde9db48f9047a5d9a8b7cbd9ff76c666e54d47e45d256e05238bcac31af8ab1720bfc236110eca1e83092b08c3c0195505575f48b626c5e6b18a6ce076cd88117f6367b8d285e2d2a096c51505fc66d49a05e60c9a4bccb77242f99363a5635e3e55bc64be535f1d6f21c81953702f759079aa8e2433dc5b1ae600ef824ba3d960f5595d3", 0xef, 0x6c}, {&(0x7f0000000700)="0a0b0da3ca571f8afb97a94eb90574e1b777a60624ecbd28a55c273e33ba51a5deb2fd959a9e6a60b43be6785cac8aebbf63fd918b0b9a11979b452270ecb6fa5d59c81fd87d00a12d783250cd0813f012b89ebeb83f444ff869b6e55c9abd0de0bb5a6802e5beba22a64c0ba811d65082d5fc55bc013f6b933dcbc26f54290b42906d69b09b5af5ddbef5a7a9b5ae2f7f65e4362dcf97e2f5cec2058c1724c5cb209cbc98bdcec99bc5e9c697ed44e45a", 0xb1, 0x4}, {&(0x7f0000000540)="3aee72fd5d7fe509d3d8e53e2b67efb4c67b6a7d17b8c8f2ad08a8e65222b3571207e82ff2fc673405474901591cf17ab2b6ac", 0x33, 0x9}, {&(0x7f00000007c0)="1f72908a95ace86066ca25a33d3ebdc7ee6a6df34a8144", 0x17, 0x687}], 0x114001, &(0x7f00000008c0)={[{@inline_data='inline_data'}, {@disable_ext_identify='disable_ext_identify'}, {@six_active_logs='active_logs=6'}, {@lazytime='lazytime'}, {@background_gc_sync='background_gc=sync'}, {@usrjquota={'usrjquota', 0x3d, 'system_u:object_r:insmod_exec_t:s0\x00'}}], [{@smackfsroot={'smackfsroot', 0x3d, 'system_u:object_r:insmod_exec_t:s0\x00'}}, {@permit_directio='permit_directio'}, {@subj_type={'subj_type', 0x3d, 'loself(@'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@audit='audit'}]}) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000a80)={0x0, @in={{0x2, 0x4e24, @loopback}}, 0x8, 0x8b0}, &(0x7f0000000a00)=0x90) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000b40)={r1, @in6={{0xa, 0x4e21, 0x7fff, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xd4f5}}, 0x6, 0x1}, 0x90) umount2(&(0x7f0000000800)='./file0\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f00000009c0)) 03:54:03 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0xa0008000, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:03 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xfffffffffffff000}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1859.485756][ T2490] block nbd4: Attempted send on invalid socket [ 1859.492322][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1859.501378][ T2490] block nbd4: Attempted send on invalid socket [ 1859.507850][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:54:03 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xffffffffffffff7f}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1859.648180][ T2489] block nbd4: Attempted send on invalid socket [ 1859.654607][ T2489] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1859.664000][ T2490] block nbd4: Attempted send on invalid socket [ 1859.670556][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:54:03 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0xc0ed0000, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 1860.937813][ C1] net_ratelimit: 24 callbacks suppressed [ 1860.943533][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1860.949343][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1861.907794][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1861.913609][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1861.919503][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1861.925280][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1861.931131][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1861.936876][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1862.057789][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1862.063585][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:54:06 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:54:06 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0xffffffffffffffff}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:54:06 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000240), &(0x7f0000000280)=0x4) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x800, 0x0) accept4$tipc(r1, &(0x7f0000000140), &(0x7f00000001c0)=0x10, 0x80000) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:06 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0xf6ffffff, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:06 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000)) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x6, 0x4010, r1, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:54:06 executing program 0: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000000c0)={r3, 0x8001, 0x10}, &(0x7f0000000140)=0xc) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:54:06 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:54:06 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='j.s\x00', 0x0, 0x0) 03:54:06 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file0/file0\x00', 0x100) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:06 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0xfffff000, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:06 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='j/s\x00', 0x0, 0x0) 03:54:06 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) r1 = dup2(r0, r0) recvfrom$inet(r1, &(0x7f0000000100)=""/13, 0xd, 0x2000, &(0x7f0000000140)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:06 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x02', 0x0, 0x0) 03:54:06 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0xfffffff6, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:06 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x03', 0x0, 0x0) 03:54:06 executing program 1: r0 = dup(0xffffffffffffff9c) accept(r0, &(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000240)=0x80) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x200000000008, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0xffffd, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000380)=0x40, 0x4) r1 = creat(&(0x7f0000000100)='./file0/file0\x00', 0x20) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0)='bpf\x00', 0x2, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getsockopt$packet_buf(r1, 0x107, 0x0, &(0x7f00000005c0)=""/192, &(0x7f0000000340)=0xc0) 03:54:07 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x501040, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000240)=""/83) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r3, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) r4 = add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)="ae37eccda0d4", 0x6, 0x0) keyctl$describe(0x6, r4, &(0x7f0000000140)=""/168, 0xa8) connect$inet(r3, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r1, 0x0, r3, 0x0, 0x810003, 0xb) 03:54:07 executing program 0: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000100)={@rand_addr, @empty}, 0x38b) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) ioctl$sock_inet_SIOCSIFBRDADDR(r3, 0x891a, &(0x7f0000000000)={'veth0_to_team\x00', {0x2, 0x4e22, @empty}}) ftruncate(r1, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r0, 0x0, 0x810005, 0x1) 03:54:09 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:54:09 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0xedc000000000, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:09 executing program 1: syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x9, 0x1) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer2\x00', 0x200040, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, 0x0, 0x20008080) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x800, 0x8000) openat$cgroup_subtree(r1, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f00000001c0)={'IDLETIMER\x00'}, &(0x7f0000000200)=0x1e) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:09 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[@ANYRES32=r1, @ANYRES64=r1], 0xfffffd80) socket$inet(0x2, 0x3, 0x1) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f0000000080)={0x8, 0x400}) setsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r1, 0x0, 0x810003, 0xb) 03:54:09 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x05', 0x0, 0x0) 03:54:09 executing program 0: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$packet_int(r1, 0x107, 0x1f, &(0x7f00000000c0)=0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) ptrace(0x4208, r3) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:54:09 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x101280}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x50, r3, 0x4, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1f}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x71}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x1}, 0x24040081) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:54:09 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xfffffffffffffffc, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:54:09 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x06', 0x0, 0x0) 03:54:09 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x8000a0ffffffff, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:09 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/87, 0x57}, {&(0x7f0000000240)=""/6, 0x6}, {&(0x7f0000000600)=""/148, 0x94}], 0x3}, 0x40000000) accept4$llc(r0, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000480)=0x10, 0x800) 03:54:09 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:54:09 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\a', 0x0, 0x0) 03:54:09 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\b', 0x0, 0x0) [ 1866.058601][ C0] net_ratelimit: 16 callbacks suppressed [ 1866.058647][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1866.070710][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1866.077893][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1866.084430][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1866.091780][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1866.097925][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:54:09 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x102) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:09 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0xf0ffffffffffff, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 1866.227814][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1866.233748][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:54:10 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\t', 0x0, 0x0) [ 1866.298144][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1866.304717][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:54:10 executing program 0: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x800, 0x0) fchdir(r3) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000000000)) 03:54:10 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x100000000000000, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:10 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:54:10 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\n', 0x0, 0x0) 03:54:10 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x10000, 0x401) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f00000001c0)={0x5, 0x4, 0x80000001, 0x4, 0x100}) gettid() mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000a40)='bpf\x00', 0xfffffffffffffffc, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000240)={'broute\x00', 0x0, 0x4, 0xaf, [], 0x4, &(0x7f0000000200)=[{}, {}, {}, {}], &(0x7f00000005c0)=""/175}, &(0x7f0000000340)=0x78) 03:54:10 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x10', 0x0, 0x0) 03:54:12 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:54:12 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x200000000000000, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:12 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) gettid() r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x1010c0, 0x0) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f0000000600)={{0x100000, 0x2000, 0xd, 0x1ff, 0x7, 0x800, 0x12b, 0x3, 0x6, 0x6, 0x401, 0x1f}, {0x2, 0x7000, 0x4, 0x3, 0x1, 0x800, 0x6, 0x7, 0x3, 0x6, 0x16, 0x7}, {0x6000, 0x104001, 0xf, 0x7fffffff, 0xff, 0xffff, 0x61da, 0xdd07, 0x5, 0x3, 0x80, 0x9}, {0x0, 0x1000, 0xf, 0x1, 0x7, 0x7fff, 0xf9a8, 0xb4, 0x5c, 0x6c7, 0x100, 0x81}, {0x4, 0x10000, 0xd, 0x2, 0x5, 0x40, 0x3e9, 0x6, 0x6, 0xdf0, 0x2, 0x100}, {0x10000, 0x7004, 0x7, 0x8, 0x1f, 0x7, 0x50c, 0x1, 0x0, 0x1f, 0x40, 0xffffffffffffffc1}, {0x100000, 0x103000, 0x0, 0xfffffffffffffffe, 0x81, 0x88e, 0x6, 0x5, 0x5f2e, 0x5, 0x101, 0x6}, {0x0, 0x0, 0xd, 0x9, 0x35, 0x1, 0x0, 0x4000, 0x6, 0x9, 0x4}, {}, {0x100000, 0x6000}, 0x7, 0x0, 0x3000, 0x100, 0x2, 0x800, 0xd001, [0x5, 0x0, 0x5, 0x6]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r1, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0x4, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x1) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:12 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs#', 0x0, 0x0) 03:54:12 executing program 0: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:54:12 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000080)={0x5, 0x70, 0xfff, 0xfffffffffffffeff, 0x6, 0x3, 0x0, 0x18, 0x2, 0x9, 0x7, 0x2, 0x7fffffff, 0x1, 0x6, 0x3ff, 0xdd4, 0x6, 0x5, 0x0, 0x7, 0x5, 0x7, 0x5, 0x7, 0xed5, 0xffff, 0x7, 0x1, 0x4, 0xffffffffffffffff, 0xffff, 0x3, 0x7, 0x4, 0x6, 0xcc, 0x1, 0x0, 0x735d, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x80, 0x6f, 0x0, 0x2, 0x7, 0x0, 0x4}) 03:54:12 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\xf0', 0x0, 0x0) 03:54:12 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:54:12 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000500)=0x0) tkill(r0, 0x9) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x1, 0x20000) mkdirat(r1, &(0x7f0000000480)='./file0/file0\x00', 0xa8) r2 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x3f, 0x400000) write$FUSE_STATFS(r2, &(0x7f0000000340)={0x60, 0x0, 0x5, {{0x1, 0x9, 0x1000, 0x200, 0xffffffff, 0x8, 0x5, 0xffff}}}, 0x60) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000001c0)='trusted.overlay.redirect\x00', &(0x7f0000000200)='./file0\x00', 0x8, 0x0) r3 = gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r3) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:13 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:54:13 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0xf6ffffff00000000, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 1869.359679][ T2489] block nbd4: Attempted send on invalid socket [ 1869.366028][ T2489] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1869.373841][ T2489] block nbd4: Attempted send on invalid socket [ 1869.380638][ T2489] print_req_error: I/O error, dev nbd4, sector 120 flags 0 [ 1869.392462][ T2490] block nbd4: Attempted send on invalid socket [ 1869.398983][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 03:54:13 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1869.406792][ T2490] block nbd4: Attempted send on invalid socket [ 1869.413124][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:54:13 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80000, 0x0) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0xe7, @bcast, @netrom={'nr', 0x0}, 0x8, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @bcast]}) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:13 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0xffffffffa0008000, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 1869.538847][ T2489] block nbd4: Attempted send on invalid socket [ 1869.545185][ T2489] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1869.568349][ T2489] block nbd4: Attempted send on invalid socket [ 1869.574765][ T2489] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:54:13 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:54:13 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000200)={0x9, 0xd3c, 0x167, {0x77359400}, 0x3f, 0x4}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x111000, 0x0) openat(r1, &(0x7f0000000380)='./file0/file0\x00', 0x2002, 0x4000000093) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x1f, 0x3, 0x1, 0x36, 0x8, r0, 0x80}, 0x2c) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 1869.736308][ T2489] block nbd4: Attempted send on invalid socket [ 1869.742836][ T2489] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1869.754192][ T2489] block nbd4: Attempted send on invalid socket [ 1869.760796][ T2489] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:54:13 executing program 0: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000000)={0x2ed, 0x0, 0x3, @stepwise={0x9, 0x6, 0xfff, 0x3ff, 0xe, 0x9}}) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) 03:54:13 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000080)={{0x2, 0x4e20, @rand_addr=0x1}, {0x306, @random="ca40e37b1027"}, 0x0, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x10}}, 'dummy0\x00'}) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:54:13 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0xfffffffffffff000, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 1871.337777][ C1] net_ratelimit: 24 callbacks suppressed [ 1871.337783][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1871.349386][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:54:16 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:54:16 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:54:16 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) statfs(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)=""/24) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:16 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bp.\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:16 executing program 0: syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x80000001, 0x80000) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$inet(0x2, 0x3, 0x1) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000300)=0x101) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000000), 0x4) ioctl$KDMKTONE(r1, 0x4b30, 0x20) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000b40)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000001f0000000600000088050000f8030000f8030000f0010000f0010000f8030000f0040000f0040000f0040000f0040000f004000006000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000be9e69fd8fc7f2963a1a11b7914858fbbb5bb25cb41d08a63d4863bb14d272ed72e1fb042d7cd5f07b31548b8cf78acb5b8a27d6b53c20131e4fe8"], @ANYBLOB="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"], 0x5e8) r5 = msgget(0x2, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1, "7817e0ee36face862df79dc867ac271f820b4e47c4b6899f9ba92b1452c0c0c14f9a291d02aee1dec99955e2966af45dc47b6922538adcf2b6ace438733c4a5a86994611889cc699acb1302942cb57c5796241016ea52d84ffbeebed8e019965b576ff621923e6f13c5cadb567664ebf99ffc393db2d663da8fbdd00d84e4ec12dd763e7d4e849e6f63d959732e7ee861c66d24cdda8fce25abcb6a1ecf79744e6f73d093e"}, 0xad, 0x800) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r4, 0xc0bc5351, &(0x7f0000000200)={0x1ff, 0x1, 'client1\x00', 0x1, "12c69ec4eea51b27", "b436ef724a5267773443dc64e2381c0176eea91e56725d6a3a6ddf7c0d3cabab", 0x2, 0x7}) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) msgctl$MSG_STAT(r5, 0xb, &(0x7f0000000080)=""/9) 03:54:16 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000000)=0x2) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) [ 1872.282543][ T2490] block nbd4: Attempted send on invalid socket [ 1872.289130][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1872.297842][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1872.299379][ T2490] block nbd4: Attempted send on invalid socket [ 1872.303738][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1872.303840][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1872.310089][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 [ 1872.315857][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1872.334723][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1872.340733][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:54:16 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:54:16 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1872.457996][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1872.463901][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:54:16 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bp/\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:16 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:54:16 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) removexattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)=@random={'system.', 'bpf\x00'}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) r0 = perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) connect$rds(r0, &(0x7f0000000100)={0x2, 0x7, @loopback}, 0x10) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:16 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs ', 0x0, 0x0) 03:54:16 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x02', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:16 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) r0 = perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) r1 = getpgid(0x0) fcntl$setown(r0, 0x8, r1) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:16 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:54:16 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x10', 0x0, 0x0) 03:54:16 executing program 0: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f00000000c0)=r1) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r3, 0x5452, &(0x7f0000000080)=0x7) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:54:16 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\xf0', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:16 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x8000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000340)=0xe8) sendto$packet(r0, &(0x7f0000000200)="5d6dbdce8d00d52ffdc37e0fadaf524b3cca119af4fac1f5850d8054769da5057532ddeed04af82b701541b48cd16aee24986ef4969751131eb8497ca3084826762e40781135bf4104b4aa626bef93fbbd0afed59c7d6af4c8767b7dcf9b50d684b34cd9d9f6f336edd19a7e7c17f442dac37a74987aa418d938da37023dde72eb35eaed193dbacd16a1b9731a0b9776e1d18c87b986545bd1dfbcb76f646a43f5a0d0243426d424", 0xa8, 0x4008880, &(0x7f0000000380)={0x11, 0xc, r1, 0x1, 0x81, 0x6, @broadcast}, 0x14) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f0000000140)) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f00000001c0)={0x101, 0x7, 0x2, "657ae0bfd46b47bf877136e89d4abf4cabbfef3d4b2393b68b73fad7e8e7b69f", 0x4c314356}) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 1873.370369][T13515] [ 1873.372920][T13515] ====================================================== [ 1873.383479][T13515] WARNING: possible circular locking dependency detected [ 1873.394784][T13515] 5.1.0-rc2-next-20190326 #11 Not tainted [ 1873.406357][T13515] ------------------------------------------------------ [ 1873.414401][T13515] syz-executor.0/13515 is trying to acquire lock: [ 1873.423205][T13515] 0000000030dc649f (&sig->cred_guard_mutex){+.+.}, at: proc_pid_attr_write+0x200/0x580 [ 1873.438517][T13515] [ 1873.438517][T13515] but task is already holding lock: [ 1873.449698][T13515] 0000000062d35c57 (&pipe->mutex/1){+.+.}, at: pipe_lock+0x6e/0x80 [ 1873.457612][T13515] [ 1873.457612][T13515] which lock already depends on the new lock. [ 1873.457612][T13515] [ 1873.468264][T13515] [ 1873.468264][T13515] the existing dependency chain (in reverse order) is: [ 1873.477352][T13515] [ 1873.477352][T13515] -> #1 (&pipe->mutex/1){+.+.}: [ 1873.484408][T13515] lock_acquire+0x16f/0x3f0 [ 1873.489459][T13515] __mutex_lock+0xf7/0x1310 [ 1873.494493][T13515] mutex_lock_nested+0x16/0x20 [ 1873.499776][T13515] fifo_open+0x159/0xb00 [ 1873.504543][T13515] do_dentry_open+0x488/0x1160 [ 1873.509822][T13515] vfs_open+0xa0/0xd0 [ 1873.514310][T13515] path_openat+0x10e9/0x46e0 [ 1873.519412][T13515] do_filp_open+0x1a1/0x280 [ 1873.524436][T13515] do_open_execat+0x137/0x690 [ 1873.529627][T13515] __do_execve_file.isra.0+0x178d/0x23f0 [ 1873.535791][T13515] __x64_sys_execve+0x8f/0xc0 [ 1873.540980][T13515] do_syscall_64+0x103/0x610 [ 1873.546177][T13515] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1873.552710][T13515] [ 1873.552710][T13515] -> #0 (&sig->cred_guard_mutex){+.+.}: [ 1873.560445][T13515] __lock_acquire+0x239c/0x3fb0 [ 1873.565844][T13515] lock_acquire+0x16f/0x3f0 [ 1873.570882][T13515] __mutex_lock+0xf7/0x1310 [ 1873.575909][T13515] mutex_lock_interruptible_nested+0x16/0x20 [ 1873.582414][T13515] proc_pid_attr_write+0x200/0x580 [ 1873.588125][T13515] __vfs_write+0x8d/0x110 [ 1873.592966][T13515] __kernel_write+0x110/0x3b0 [ 1873.598180][T13515] write_pipe_buf+0x15d/0x1f0 [ 1873.603406][T13515] __splice_from_pipe+0x395/0x7d0 [ 1873.608952][T13515] splice_from_pipe+0x108/0x170 [ 1873.614437][T13515] default_file_splice_write+0x3c/0x90 [ 1873.621114][T13515] do_splice+0x70a/0x13c0 [ 1873.625955][T13515] __x64_sys_splice+0x2c6/0x330 [ 1873.631323][T13515] do_syscall_64+0x103/0x610 [ 1873.636447][T13515] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1873.643083][T13515] [ 1873.643083][T13515] other info that might help us debug this: [ 1873.643083][T13515] [ 1873.653309][T13515] Possible unsafe locking scenario: [ 1873.653309][T13515] [ 1873.660750][T13515] CPU0 CPU1 [ 1873.666220][T13515] ---- ---- [ 1873.671581][T13515] lock(&pipe->mutex/1); [ 1873.675908][T13515] lock(&sig->cred_guard_mutex); [ 1873.683457][T13515] lock(&pipe->mutex/1); [ 1873.690315][T13515] lock(&sig->cred_guard_mutex); [ 1873.703076][T13515] [ 1873.703076][T13515] *** DEADLOCK *** [ 1873.703076][T13515] [ 1873.711232][T13515] 2 locks held by syz-executor.0/13515: [ 1873.716801][T13515] #0: 0000000053581691 (sb_writers#6){.+.+}, at: do_splice+0xe02/0x13c0 [ 1873.725396][T13515] #1: 0000000062d35c57 (&pipe->mutex/1){+.+.}, at: pipe_lock+0x6e/0x80 [ 1873.733727][T13515] [ 1873.733727][T13515] stack backtrace: [ 1873.739624][T13515] CPU: 0 PID: 13515 Comm: syz-executor.0 Not tainted 5.1.0-rc2-next-20190326 #11 [ 1873.748719][T13515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1873.758773][T13515] Call Trace: [ 1873.762140][T13515] dump_stack+0x172/0x1f0 [ 1873.766488][T13515] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 1873.772571][T13515] check_prev_add.constprop.0+0xf11/0x23c0 [ 1873.778373][T13515] ? find_held_lock+0x35/0x130 [ 1873.783935][T13515] ? check_usage+0x570/0x570 [ 1873.788544][T13515] ? mark_held_locks+0xa4/0xf0 [ 1873.793312][T13515] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 1873.799128][T13515] ? graph_lock+0x7b/0x200 [ 1873.803550][T13515] ? __lockdep_reset_lock+0x450/0x450 [ 1873.808916][T13515] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1873.815152][T13515] __lock_acquire+0x239c/0x3fb0 [ 1873.820032][T13515] ? mark_held_locks+0xf0/0xf0 [ 1873.824785][T13515] ? do_splice+0x70a/0x13c0 [ 1873.829455][T13515] lock_acquire+0x16f/0x3f0 [ 1873.834037][T13515] ? proc_pid_attr_write+0x200/0x580 [ 1873.839313][T13515] ? proc_pid_attr_write+0x200/0x580 [ 1873.844592][T13515] __mutex_lock+0xf7/0x1310 [ 1873.849109][T13515] ? proc_pid_attr_write+0x200/0x580 [ 1873.854415][T13515] ? proc_pid_attr_write+0x200/0x580 [ 1873.859712][T13515] ? mutex_trylock+0x1e0/0x1e0 [ 1873.864481][T13515] ? check_stack_object+0x114/0x160 [ 1873.869716][T13515] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1873.875972][T13515] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1873.882233][T13515] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1873.888472][T13515] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1873.894805][T13515] ? _copy_from_user+0xdd/0x150 [ 1873.899666][T13515] mutex_lock_interruptible_nested+0x16/0x20 [ 1873.905653][T13515] ? mutex_lock_interruptible_nested+0x16/0x20 [ 1873.911902][T13515] proc_pid_attr_write+0x200/0x580 [ 1873.917004][T13515] __vfs_write+0x8d/0x110 [ 1873.921353][T13515] ? proc_loginuid_write+0x4d0/0x4d0 [ 1873.926650][T13515] __kernel_write+0x110/0x3b0 [ 1873.931352][T13515] write_pipe_buf+0x15d/0x1f0 [ 1873.936035][T13515] ? do_splice_direct+0x2a0/0x2a0 [ 1873.941079][T13515] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1873.947336][T13515] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 1873.953427][T13515] __splice_from_pipe+0x395/0x7d0 [ 1873.958446][T13515] ? do_splice_direct+0x2a0/0x2a0 [ 1873.963465][T13515] ? do_splice_direct+0x2a0/0x2a0 [ 1873.968499][T13515] splice_from_pipe+0x108/0x170 [ 1873.973343][T13515] ? splice_shrink_spd+0xd0/0xd0 [ 1873.978291][T13515] default_file_splice_write+0x3c/0x90 [ 1873.983760][T13515] ? generic_splice_sendpage+0x50/0x50 [ 1873.989210][T13515] do_splice+0x70a/0x13c0 [ 1873.993530][T13515] ? opipe_prep.part.0+0x2d0/0x2d0 [ 1873.998633][T13515] ? __fget_light+0x1a9/0x230 [ 1874.003305][T13515] __x64_sys_splice+0x2c6/0x330 [ 1874.008159][T13515] do_syscall_64+0x103/0x610 [ 1874.012764][T13515] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1874.018771][T13515] RIP: 0033:0x458209 [ 1874.022645][T13515] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1874.042634][T13515] RSP: 002b:00007efd8c210c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 1874.051035][T13515] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000458209 [ 1874.059010][T13515] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 1874.067098][T13515] RBP: 000000000073bfa0 R08: 0000000000810003 R09: 000000000000000b [ 1874.075057][T13515] R10: 0000000000000000 R11: 0000000000000246 R12: 00007efd8c2116d4 [ 1874.083014][T13515] R13: 00000000004c6fdc R14: 00000000004dbc20 R15: 00000000ffffffff [ 1874.122958][ T3879] kobject: 'loop3' (0000000001320c9f): kobject_uevent_env [ 1874.132162][ T3879] kobject: 'loop3' (0000000001320c9f): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1874.145935][ T3879] kobject: 'loop1' (0000000062505c52): kobject_uevent_env [ 1874.153517][ T3879] kobject: 'loop1' (0000000062505c52): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1874.173735][ T3879] kobject: 'loop0' (0000000076ca3709): kobject_uevent_env [ 1874.181419][ T3879] kobject: 'loop0' (0000000076ca3709): fill_kobj_path: path = '/devices/virtual/block/loop0' 03:54:19 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:54:19 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:54:19 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ioctl$FICLONE(r1, 0x40049409, r1) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r1, 0x0, 0x7) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:54:19 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\xc0', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:19 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x800000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380)='/dev/snapshot\x00', 0x400000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="cc000000", @ANYRES16=r2, @ANYBLOB="20b13e927000fcdbdf250d00000048000500440002000800040078040000080002000900000008000100100000000800010018002d000800010041000000080004000200000008000200020000000800030002000000240007000c00040080000000000000000c000400ff7f00000000000008000200f7ffffff34000900080001000900000008000200010400000800010056830000080001000400000008000100dd49a514080001000100008018000100080003008e0000000c0002000800020020000000"], 0xcc}, 0x1, 0x0, 0x0, 0x4040}, 0x0) socket$tipc(0x1e, 0x7, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000480)='bpf\x00', 0x40000, &(0x7f0000000700)={[{@mode={'mode', 0x3d, 0x8}}], [{@audit='audit'}, {@context={'context', 0x3d, 'system_u'}}, {@dont_measure='dont_measure'}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/snapshot\x00'}}, {@fsname={'fsname', 0x3d, 'TIPCv2\x00'}}, {@dont_measure='dont_measure'}, {@dont_measure='dont_measure'}]}) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000540)='bpf\x00', 0xfffffffffffffffe, 0x0) ioctl$VIDIOC_G_STD(0xffffffffffffffff, 0x80085617, &(0x7f0000000100)=0x0) ioctl$VIDIOC_S_STD(r0, 0x40085618, &(0x7f0000000140)=r3) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:19 executing program 0: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x7fffffff, 0x7, 0xb396, 0x0, 0x5439c25b, 0x7}) [ 1875.586526][ T2490] nbd_handle_cmd: 6 callbacks suppressed [ 1875.586543][ T2490] block nbd4: Attempted send on invalid socket [ 1875.599157][ T2490] print_req_error: 6 callbacks suppressed [ 1875.599176][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1875.617385][ T2490] block nbd4: Attempted send on invalid socket [ 1875.623986][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:54:19 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:54:19 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:19 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x2, 0x2) setsockopt$inet_buf(r0, 0x0, 0x2e, &(0x7f00000001c0)="4dfa7734eaf1d4d478f555da7da297656e78a3cd468bfc8c2cfb0cfb38841638bce4906867c89d1f435fb4d3c5247f95968f68af72ed7da314dddbc13496833bb1caceda17eda7720eb8c69825b9c4d16a5267904845ba9f4ed4506868cc88a019256cd028824025ad2f70699afc95d1fc733a13597a8f74fb224f794578a5e8f5eba7c7901ea6311fd84b4d8d81", 0x8e) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0x2, 0x0, @dev}}, 0x0, 0x0, 0x0, 0x0, 0x59}, 0x98) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 1875.717830][ T3879] kobject: 'loop4' (00000000c629a6bd): kobject_uevent_env [ 1875.728827][ T3879] kobject: 'loop4' (00000000c629a6bd): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1875.755469][ T2489] block nbd4: Attempted send on invalid socket [ 1875.762241][ T2489] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1875.770376][ T2490] block nbd4: Attempted send on invalid socket [ 1875.776742][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 [ 1875.784997][ T3879] kobject: 'loop3' (0000000001320c9f): kobject_uevent_env [ 1875.795531][ T3879] kobject: 'loop3' (0000000001320c9f): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1875.806762][ T3879] kobject: 'loop1' (0000000062505c52): kobject_uevent_env 03:54:19 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1875.823257][ T3879] kobject: 'loop1' (0000000062505c52): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1875.855958][ T3879] kobject: 'loop4' (00000000c629a6bd): kobject_uevent_env [ 1875.865622][ T3879] kobject: 'loop4' (00000000c629a6bd): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:54:19 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\xc0', 0x0, 0x0) [ 1875.896837][ T2489] block nbd4: Attempted send on invalid socket [ 1875.903198][ T2489] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1875.914003][ T2489] block nbd4: Attempted send on invalid socket [ 1875.920301][ T2489] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:54:19 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\xa0', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 1875.978038][ T3879] kobject: 'loop4' (00000000c629a6bd): kobject_uevent_env [ 1875.985269][ T3879] kobject: 'loop4' (00000000c629a6bd): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1876.020860][ T3879] kobject: 'loop3' (0000000001320c9f): kobject_uevent_env [ 1876.028542][ T3879] kobject: 'loop3' (0000000001320c9f): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1876.046942][ T3879] kobject: 'loop1' (0000000062505c52): kobject_uevent_env [ 1876.055499][ T3879] kobject: 'loop1' (0000000062505c52): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1876.082573][ T3879] kobject: 'loop4' (00000000c629a6bd): kobject_uevent_env [ 1876.090203][ T3879] kobject: 'loop4' (00000000c629a6bd): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1876.160909][ T3879] kobject: 'loop3' (0000000001320c9f): kobject_uevent_env [ 1876.168417][ T3879] kobject: 'loop3' (0000000001320c9f): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1876.384716][ T3879] kobject: 'loop5' (000000003b88a760): kobject_uevent_env [ 1876.392034][ T3879] kobject: 'loop5' (000000003b88a760): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1876.414632][ T3879] kobject: 'loop0' (0000000076ca3709): kobject_uevent_env [ 1876.426228][ T3879] kobject: 'loop0' (0000000076ca3709): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1876.457801][ C0] net_ratelimit: 16 callbacks suppressed [ 1876.457809][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1876.469326][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1876.475117][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1876.480889][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1876.486659][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1876.492431][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1876.617767][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1876.623573][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1876.697766][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1876.703623][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:54:22 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:54:22 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x5, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0, 0x0) gettid() stat(&(0x7f0000000100)='./file0/file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x1, &(0x7f0000000140)=[r0]) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:22 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:54:22 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\xff', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:22 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x802) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f0000000000)={0x0, @aes128, 0x0, "84791fc48d80ee55"}) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:54:22 executing program 0: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x5, 0x3ff) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:54:22 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x0f', 0x0, 0x0) 03:54:22 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 1878.617428][ T2490] block nbd4: Attempted send on invalid socket [ 1878.623885][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1878.636569][ T2490] block nbd4: Attempted send on invalid socket [ 1878.643082][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:54:22 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0/file0/../file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 1878.699264][ T3879] kobject: 'loop4' (00000000c629a6bd): kobject_uevent_env [ 1878.706452][ T3879] kobject: 'loop4' (00000000c629a6bd): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1878.730575][ T3879] kobject: 'loop3' (0000000001320c9f): kobject_uevent_env [ 1878.738897][ T3879] kobject: 'loop3' (0000000001320c9f): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:54:22 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1878.755082][ T3879] kobject: 'loop1' (0000000062505c52): kobject_uevent_env [ 1878.770534][ T3879] kobject: 'loop1' (0000000062505c52): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1878.836405][ T3879] kobject: 'loop4' (00000000c629a6bd): kobject_uevent_env [ 1878.854235][ T3879] kobject: 'loop4' (00000000c629a6bd): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:54:22 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:22 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\xa0', 0x0, 0x0) [ 1878.884947][ T2489] block nbd4: Attempted send on invalid socket [ 1878.891329][ T2489] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1878.901404][ T2489] block nbd4: Attempted send on invalid socket [ 1878.907832][ T2489] print_req_error: I/O error, dev nbd4, sector 120 flags 0 [ 1878.967425][ T3879] kobject: 'loop4' (00000000c629a6bd): kobject_uevent_env [ 1878.982299][ T3879] kobject: 'loop4' (00000000c629a6bd): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1878.996831][ T3879] kobject: 'loop3' (0000000001320c9f): kobject_uevent_env [ 1879.004888][ T3879] kobject: 'loop3' (0000000001320c9f): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1879.015963][ T3879] kobject: 'loop1' (0000000062505c52): kobject_uevent_env [ 1879.023521][ T3879] kobject: 'loop1' (0000000062505c52): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1879.078422][ T3879] kobject: 'loop4' (00000000c629a6bd): kobject_uevent_env [ 1879.085610][ T3879] kobject: 'loop4' (00000000c629a6bd): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1879.150666][ T3879] kobject: 'loop3' (0000000001320c9f): kobject_uevent_env [ 1879.158099][ T3879] kobject: 'loop3' (0000000001320c9f): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1879.441204][ T3879] kobject: 'loop0' (0000000076ca3709): kobject_uevent_env [ 1879.449619][ T3879] kobject: 'loop0' (0000000076ca3709): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1879.460457][ T3879] kobject: 'loop5' (000000003b88a760): kobject_uevent_env [ 1879.467732][ T3879] kobject: 'loop5' (000000003b88a760): fill_kobj_path: path = '/devices/virtual/block/loop5' 03:54:25 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 03:54:25 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\xff', 0x0, 0x0) 03:54:25 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:25 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x2014000, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:25 executing program 0: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000140)={0xb, @vbi={0x8, 0x3, 0xffffffffffffff7f, 0x32314142, [0x9, 0x6], [0x1, 0x80000001], 0x1}}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) splice(r3, &(0x7f0000000000), r1, &(0x7f0000000080), 0xbe, 0x0) 03:54:25 executing program 5: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000000)={0x28, 0x2, 0x0, {0x5, 0xe54, 0x80}}, 0x28) close(r2) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@ipv6_getmulticast={0x14, 0x3a, 0x400, 0x70bd25, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 03:54:25 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\xff', 0x0, 0x0) [ 1881.703383][ T3879] kobject: 'loop4' (00000000c629a6bd): kobject_uevent_env [ 1881.716982][ T3879] kobject: 'loop4' (00000000c629a6bd): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1881.737759][ C1] net_ratelimit: 24 callbacks suppressed [ 1881.737777][ C1] protocol 88fb is buggy, dev hsr_slave_0 03:54:25 executing program 2: clone(0x3102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xa7}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 1881.749256][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:54:25 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:54:25 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x14) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x0, 0x2) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ion\x00', 0x800, 0x0) lsetxattr$security_evm(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.evm\x00', &(0x7f0000000680)=ANY=[@ANYRES32=r0], 0x1, 0x2) gettid() r1 = syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0x80000001, 0x84000) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000500)=@req={0x28, &(0x7f0000000480)={'\x00', @ifru_addrs=@hci={0x1f, 0x0}}}) connect(r0, &(0x7f0000000600)=@ll={0x11, 0x1b, r2, 0x1, 0x6, 0x6, @local}, 0x80) 03:54:25 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 1881.877296][ T3879] kobject: 'loop4' (00000000c629a6bd): kobject_uevent_env [ 1881.885034][ T3879] kobject: 'loop4' (00000000c629a6bd): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1881.901301][ T3879] kobject: 'loop1' (0000000062505c52): kobject_uevent_env [ 1881.911299][ T3879] kobject: 'loop1' (0000000062505c52): fill_kobj_path: path = '/devices/virtual/block/loop1' 03:54:25 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1881.912005][ T2490] block nbd4: Attempted send on invalid socket [ 1881.928024][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1881.935793][ T2490] block nbd4: Attempted send on invalid socket [ 1881.942527][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 [ 1881.950431][ T3879] kobject: 'loop3' (0000000001320c9f): kobject_uevent_env [ 1881.960850][ T3879] kobject: 'loop3' (0000000001320c9f): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1882.018617][ T3879] kobject: 'loop4' (00000000c629a6bd): kobject_uevent_env [ 1882.033723][ T3879] kobject: 'loop4' (00000000c629a6bd): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:54:25 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1882.076363][ T2490] block nbd4: Attempted send on invalid socket [ 1882.082823][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1882.096434][ T2490] block nbd4: Attempted send on invalid socket [ 1882.102699][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:54:25 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\xff', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 03:54:25 executing program 1: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x3, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x0, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5002, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x2c0540, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f00000001c0)={0x7b, 0x0, [0x1, 0x2, 0xacd, 0x100000001]}) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 1882.137196][ T3879] kobject: 'loop4' (00000000c629a6bd): kobject_uevent_env [ 1882.148328][ T3879] kobject: 'loop4' (00000000c629a6bd): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1882.170018][ T2489] block nbd4: Attempted send on invalid socket [ 1882.176245][ T2489] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1882.184325][ T2490] block nbd4: Attempted send on invalid socket [ 1882.194248][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 [ 1882.203826][ T2490] block nbd4: Attempted send on invalid socket [ 1882.210327][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1882.218341][ T2489] block nbd4: Attempted send on invalid socket [ 1882.224539][ T2489] print_req_error: I/O error, dev nbd4, sector 120 flags 0 03:54:26 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) [ 1882.231739][ T3879] kobject: 'loop3' (0000000001320c9f): kobject_uevent_env [ 1882.244129][ T3879] kobject: 'loop3' (0000000001320c9f): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1882.270515][ T3879] kobject: 'loop1' (0000000062505c52): kobject_uevent_env [ 1882.278263][ T3879] kobject: 'loop1' (0000000062505c52): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1882.309416][ T3879] kobject: 'loop4' (00000000c629a6bd): kobject_uevent_env [ 1882.320572][ T3879] kobject: 'loop4' (00000000c629a6bd): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1882.356490][ T2490] block nbd4: Attempted send on invalid socket [ 1882.363058][ T2490] print_req_error: I/O error, dev nbd4, sector 64 flags 0 [ 1882.370690][ T2490] block nbd4: Attempted send on invalid socket [ 1882.376928][ T2490] print_req_error: I/O error, dev nbd4, sector 120 flags 0 [ 1882.430870][ T3879] kobject: 'loop4' (00000000c629a6bd): kobject_uevent_env [ 1882.438273][ T3879] kobject: 'loop4' (00000000c629a6bd): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1882.461449][ T3879] kobject: 'loop3' (0000000001320c9f): kobject_uevent_env [ 1882.476205][ T3879] kobject: 'loop3' (0000000001320c9f): fill_kobj_path: path = '/devices/virtual/block/loop3' 03:54:26 executing program 0: pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x20, &(0x7f0000000100)={@rand_addr, @dev={0xac, 0x14, 0x14, 0x1e}}, 0xa) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e23, 0x1, @loopback, 0x3}, {0xa, 0x4e23, 0x9, @ipv4={[], [], @remote}, 0x6}, 0x400, [0x488, 0x8, 0xea02, 0x8, 0x2, 0x7dd, 0x2, 0x8]}, 0x5c) splice(r0, 0x0, r2, 0x0, 0x810003, 0xb) 03:54:26 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='jfs\x00', 0x0, 0x0) 03:54:26 executing program 3: sendmsg$TIPC_CMD_GET_MEDIA_NAMES(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x101, 0x400, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xff, 0x8, 0x40, 0x86, 0x0, 0x2, 0x3f, 0xfffffffffffffff9, 0x7aa, 0x8, 0x0, 0xc48, 0x0, 0xffffffffffffffe0, 0x1, 0x0, 0x0, 0x0, 0x2746ec8a, 0x9, 0x1, 0x3, 0x1fc0000, 0x8, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x8}, 0x880, 0xfff, 0xfffffffffffffffe, 0x0, 0xdf, 0x5}, 0x0, 0xc, 0xffffffffffffffff, 0x9) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x588e, 0x0) gettid() mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 1882.507497][ T3879] kobject: 'loop5' (000000003b88a760): kobject_uevent_env [ 1882.517260][ T3879] kobject: 'loop5' (000000003b88a760): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1882.534631][ T3879] kobject: 'loop1' (0000000062505c52): kobject_uevent_env [ 1882.546001][ T3879] kobject: 'loop1' (0000000062505c52): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 1882.562748][ T3879] kobject: 'loop0' (0000000076ca3709): kobject_uevent_env [ 1882.599364][ T3879] kobject: 'loop0' (0000000076ca3709): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1882.648059][ T3879] kobject: 'loop4' (00000000c629a6bd): kobject_uevent_env [ 1882.656032][ T3879] kobject: 'loop4' (00000000c629a6bd): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1882.697777][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1882.703679][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1882.709550][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1882.715310][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1882.721151][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1882.726932][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1882.760164][ T3879] kobject: 'loop3' (0000000001320c9f): kobject_uevent_env [ 1882.767417][ T3879] kobject: 'loop3' (0000000001320c9f): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1882.857742][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1882.863562][ C1] protocol 88fb is buggy, dev hsr_slave_1